Windows NT What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used The station that hold the token has the highest priority on the network The station that holds the token is allowed to transmit a message on the network A token contains information that is used to route messages between rings None of these Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used The station that hold the token has the highest priority on the network The station that holds the token is allowed to transmit a message on the network A token contains information that is used to route messages between rings None of these ANSWER DOWNLOAD EXAMIANS APP
Windows NT As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from any Windows NT Workstation computer in the RESEARCH domain - any Windows NT Workstation computer in the LAB domain None of these any Windows NT Server backup domain controller in the LAB domain any Windows NT Server backup domain controllers in the RESEARCH domain any Windows NT Workstation computer in the RESEARCH domain - any Windows NT Workstation computer in the LAB domain None of these any Windows NT Server backup domain controller in the LAB domain any Windows NT Server backup domain controllers in the RESEARCH domain ANSWER DOWNLOAD EXAMIANS APP
Windows NT In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem? incorrect subnet mask on your client computer incorrect termination of the destination network malfunctioning repeater None of these defective network adapter in the router incorrect subnet mask on your client computer incorrect termination of the destination network malfunctioning repeater None of these defective network adapter in the router ANSWER DOWNLOAD EXAMIANS APP
Windows NT Bridges are ideally used in environments where there a number of well defined workgroups None of these FALSE A complete trust mode, with each engineer's computer trusting the other engineer's computers True A workgroup mode, with each engineer administering his or her own computer None of these FALSE A complete trust mode, with each engineer's computer trusting the other engineer's computers True A workgroup mode, with each engineer administering his or her own computer ANSWER DOWNLOAD EXAMIANS APP
Windows NT In which of the following cable systems are T connectors and terminators are used? Thin Ethernet lOBase T Token Ring None of these FDDI Thin Ethernet lOBase T Token Ring None of these FDDI ANSWER DOWNLOAD EXAMIANS APP
Windows NT You are setting up a network in a school. You need to network 5 computers for the file and printer sharing. You want to use some donated cable and Ethernet adapters. You identify the donated adapters as ARCnet coaxial network adapters and 10Base2 Ethernet network adapters. You install an Ethernet adapter in each of the 5 computers and connect the donated cable. The computers are NOT able to maintain reliable communication. You suspect that you are NOT using the correct type of coaxial cable. Which type of coaxial cable should you be using? RJ-11 RG-58 AU RG-59 AU None of these RJ-45 RJ-11 RG-58 AU RG-59 AU None of these RJ-45 ANSWER DOWNLOAD EXAMIANS APP