Windows NT What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? None of these The station that holds the token is allowed to transmit a message on the network The station that hold the token has the highest priority on the network A token contains information that is used to route messages between rings Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used None of these The station that holds the token is allowed to transmit a message on the network The station that hold the token has the highest priority on the network A token contains information that is used to route messages between rings Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used ANSWER DOWNLOAD EXAMIANS APP
Windows NT You are setting up a network in a school. You need to network 5 computers for the file and printer sharing. You want to use some donated cable and Ethernet adapters. You identify the donated adapters as ARCnet coaxial network adapters and 10Base2 Ethernet network adapters. You install an Ethernet adapter in each of the 5 computers and connect the donated cable. The computers are NOT able to maintain reliable communication. You suspect that you are NOT using the correct type of coaxial cable. Which type of coaxial cable should you be using? RJ-45 None of these RJ-11 RG-59 AU RG-58 AU RJ-45 None of these RJ-11 RG-59 AU RG-58 AU ANSWER DOWNLOAD EXAMIANS APP
Windows NT Bridges operate at the MAC layer (layer 2 of the OSI model.) All network adapters in all computers on the same network must be set to the same IRQ None of these FALSE True All network adapters in all computers on the same network must be set to different IRQs All network adapters in all computers on the same network must be set to the same IRQ None of these FALSE True All network adapters in all computers on the same network must be set to different IRQs ANSWER DOWNLOAD EXAMIANS APP
Windows NT Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only None of these Use Performance Monitor to create a log of all logon attempts Use User Manager for Domains to set an Audit policy for all logon attempts Use the Services option in Control Panel to start the Alerter service to audit logon attempts Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only None of these Use Performance Monitor to create a log of all logon attempts Use User Manager for Domains to set an Audit policy for all logon attempts Use the Services option in Control Panel to start the Alerter service to audit logon attempts ANSWER DOWNLOAD EXAMIANS APP
Windows NT Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments None of these FALSE Mirror the files on multiple partitions from one Windows NT Server computer to another Copy files from a Windows NT Workstation computer to a Windows NT Server computer True None of these FALSE Mirror the files on multiple partitions from one Windows NT Server computer to another Copy files from a Windows NT Workstation computer to a Windows NT Server computer True ANSWER DOWNLOAD EXAMIANS APP
Windows NT A cut-through switch reads the entire packet before forwarding it to the destination segment is bi-directional [both way] None of these True can be created between Windows NT W/S computers FALSE is bi-directional [both way] None of these True can be created between Windows NT W/S computers FALSE ANSWER DOWNLOAD EXAMIANS APP