logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows NT Comments

  • Question
  • What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?


  • Options
  • A. Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
  • B. The station that holds the token is allowed to transmit a message on the network
  • C. The station that hold the token has the highest priority on the network
  • D. A token contains information that is used to route messages between rings
  • E. None of the above

  • Correct Answer
  • The station that holds the token is allowed to transmit a message on the network 


  • Windows NT problems


    Search Results


    • 1. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 2. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

    • Options
    • A. Start the Replication service on Kim's Windows for Workgroups computer
    • B. Relocate Kim's home directory to her Windows for Workgroups computer
    • C. Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
    • D. You cannot do this. Home directories can be accessed only by Windows NT computers
    • Discuss
    • 3. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

    • Options
    • A. True
    • B. False.
    • Discuss
    • 4. In OSI network architecture, the dialogue control and token management are responsibilities of

    • Options
    • A. session layer
    • B. network layer
    • C. transport layer
    • D. data link layer
    • E. None of the above
    • Discuss
    • 5. Which of the following TCP/IP protocol is used for transferring files from one machine to another?

    • Options
    • A. RARP
    • B. ARP
    • C. TCP
    • D. FTP
    • E. None of the above
    • Discuss
    • 6. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

    • Options
    • A. Make JohnY a member of the DESIGN Domain Guests group
    • B. Make JohnY a member of the DESIGN Domain Users group
    • C. Do nothing. JohnY can access the printer now
    • D. JohnY cannot access the printer with this configuration
    • E. None of the above
    • Discuss
    • 7. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

    • Options
    • A. Use Performance Monitor to create a log of all logon attempts
    • B. Use User Manager for Domains to set an Audit policy for all logon attempts
    • C. Use the Services option in Control Panel to start the Alerter service to audit logon attempts
    • D. Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only
    • E. None of the above
    • Discuss
    • 8. An ethernet switch works at the protocol layer

    • Options
    • A. True
    • B. False
    • Discuss
    • 9. When of the following is a system default profile used?

    • Options
    • A. When there is no user logged on at the computer
    • B. When a user has logged on using the Guest account
    • C. When, after the user has logged on, the personal or mandatory profiles are missing or corrupted
    • D. When the local accounts database recognizes that the user logging on has never done so from this computer
    • E. None of the above
    • Discuss
    • 10. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports

    • Options
    • A. True
    • B. False
    • Discuss


    Comments

    There are no comments.

Enter a new Comment