MTA Networking Essentials
A star network topology.
A bus network topology.
A mesh network topology.
A ring network topology.
It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which is attached.
It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a particular address only to the port to which it is attached
It operates at the Physical layer of the OSI model.
It operates at the Data-Link layer of the OSI model.
The document layer.
The application layer.
The system layer.
The Data-link layer.
You should consider adding a DHCP server to the clients network
You should consider adding a DNS server to the clients network
You should consider adding a Web server to the clients network
You should consider adding a WINS server to the clients network
You should make sure that the RRAS service is configured.
You should make sure that WEb service is configured.
You should make sure that the DNS service is configured.
You should make sure that the DHCP relay agent service is configured.
An FDDI network cannot contain rings that are longer than 100 kilometers respectively.
An FDDI network can contain rings that exceed 100 kilometers respectively.
Each ring in a FDDI network can support a maximum of 500 nodes.
Each ring in a FDDI network can support a maximum of 50 nodes.
10BaseT cables are made up of twisted pair cables that are a maximum of 100 meters in length.
10BaseT cables are made up of twisted pair cables that are a maximum of 10 meters in length.
10BaseT cables allows for the system to operate at 10Mbps.
10BaseT cables allows for the system to operate at 100 Mbps.
The customer should have a switch.
The cusotmer should have a modem.
The customer should have a server.
The customer should have a switch.
For the purpose of viewing the names registered locally by NetBIOS applications.
For the purpose of viewing the current NetBIOS sessions and their status, with the IP address.
For the purpose of purging the name cache.
For the purpose of viewing the NetBIOS sessions table converting destination IP addresses to computer NetBIOS names.
It allows you to specify a Time To Live for outgoing packets.
It allows you to specify the type of service.
It allows you to specify the amount of data to include int he ping.
It allows you to resolve addresses to host names.
You should make use of a hub and a UTP crossover cable with RJ-45 connectors.
You should make use of a hub and a UTP crossover cable with RJ-11 connectors.
You should make use of a UTP crossover cable with RJ-45 connectors.
You should make use of a UTP crossover cable with RJ-11 connectors.
T3 internet connections have a minimum transmission rate of 64 Mbps.
T3 internet connections have a minimum transmission rate of 56 Kbps.
T3 internet connections have a minimum transmission rate of 10 Mbps.
T3 internet connections have a minimum transmission rate of 128 Mbps.
ISDN operates at a minimum speed of 128 Kbps.
ISDN operates at a maximum speed of 128 Mbps.
ISDN operates at a maximum speed of 128 Kbps.
ISDN operates at a minimum speed of 128 Mbps.
It allows the ping command to keep sending Echo Requests messages to the ISP server until interrupted.
It performs reverse name resolution on the ISP's DNs server IP address.
It sends Echo Request messages with the Don't Fragment flag in the IP header set to 1.
It sends Echo Request messages a specified amount of times.
The Data-link layer deals with the transmission and reception of the unstructured raw bit steam over a physical medium.
The Data-link layer controls the operation of the subnet.
The Data-link layer deals with error-free transfer of data frames from one node to another over the physical layer.
The Data-link layer makes sure that messages are conveyed error-free, sequentially, and with no losses or duplications.
You should make use of DNS as the name resolution strategy.
You should make use of NetBIOS as the name resolution strategy.
You should make use of DHCP as the name resolution strategy.
You should make use of Peer Name Resolution Protocol as the name resolution strategy.
You should make use of Coaxial cable.
You should make use of fiber-optic cable.
You should make use of Shielded Twisted-Pair cable.
You should make use of Unshielded Twisted-Pair cable.
IPv4 addresses are represented in a dotted-decimal format, while IPv6 addresses are represented in a colon-hexadecimal format.
IPv4 addresses are represented in a colon-hexadecimal format, while IPv6 addresses are represented in a dotted-decimal format.
IPv4 addresses make use of the last 32 bits of IPv6 addresses for interoperability.
IPv4 addresses make use of the first 32 bits of IPv6 addresses for interoperability.
It is used to prevent broadcast traffic across the two subnets.
It is used to pass broadcast traffic across the two subnets.
It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, whether it is configured on the VPN server or not.
It allows a remote access client to obtain an IP address on the intranet to which a VPN server's LAN adapter is connected, if it is configured on the VPN server.
It requires multi-mode fiber optic cable.
It requires single-mode fiber optic cable.
It can work over distances in excess of 70 Km.
The maximum length of a cable segment is 10 Km.
A Ring network manages the connectivity between workstations without the need of a central node.
When you connect or remove devices on the Ring network, there are no interruptions.
A Ring network prevents the passing of data packets through an excessive number of nodes.
The number of nodes in a Ring network has no impact on communication delays.
A star network manages the connectivity between workstations without the need of a central node.
When you connect or remove devices on the Star network, there are no interruptions.
A Star network allows the passing of data packets through an excessive number of nodes.
Failure of the central hub has no impact on a Star network.
It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the transport layer of the OSI model.
It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the physical layer of the OSI model.
It allows an IPv6 socket to communicate with an IPv4, and IPv6 peer at the data-link layer of the OSI model.
It allows an IPv6 asocket to communicate with an IPv4, and IPv6 peer at the session layer of the OSI model.
It's the connectivity between workstations without the need of a central node.
It does not require the use of switching or broadcasting.
It prevents the number of data packets through an excessive number of nodes.
The number of nodes in a fully connected mesh network has no impact on communication delays.
The Transport layer deals with the transmission and reception of the unstructured raw bit stream over a physical medium.
The Transport layer controls the operation of the subnet.
The Transport layer deals with error-free trasfer of data frames from one node to another over the physical layer.
The Transport layer makes sure that messages are conveyed error-free, srquentially, and with no losses or duplications.
ADSL
IDSL
HDSL
VDSL
PVC cable.
Plenum rated cable.
Fiber-optic cable.
Carpet Cable.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.