Windows NT What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification? A token contains information that is used to route messages between rings The station that hold the token has the highest priority on the network The station that holds the token is allowed to transmit a message on the network None of these Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used A token contains information that is used to route messages between rings The station that hold the token has the highest priority on the network The station that holds the token is allowed to transmit a message on the network None of these Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used ANSWER DOWNLOAD EXAMIANS APP
Windows NT Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI? None of these physical and data link transport and session media access control and logical link control network and transport None of these physical and data link transport and session media access control and logical link control network and transport ANSWER DOWNLOAD EXAMIANS APP
Windows NT In heavily overloaded networks, cross-bar switching offers better performance than cell-backplane switching None of these True wireless infrared fiber-optic cable FALSE None of these True wireless infrared fiber-optic cable FALSE ANSWER DOWNLOAD EXAMIANS APP
Windows NT Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this? Use User Manager for Domains to set an Audit policy for all logon attempts Use the Services option in Control Panel to start the Alerter service to audit logon attempts Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only None of these Use Performance Monitor to create a log of all logon attempts Use User Manager for Domains to set an Audit policy for all logon attempts Use the Services option in Control Panel to start the Alerter service to audit logon attempts Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only None of these Use Performance Monitor to create a log of all logon attempts ANSWER DOWNLOAD EXAMIANS APP
Windows NT In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem? incorrect subnet mask on your client computer defective network adapter in the router malfunctioning repeater incorrect termination of the destination network None of these incorrect subnet mask on your client computer defective network adapter in the router malfunctioning repeater incorrect termination of the destination network None of these ANSWER DOWNLOAD EXAMIANS APP
Windows NT Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use? None of these T connecter router repeater gateway None of these T connecter router repeater gateway ANSWER DOWNLOAD EXAMIANS APP