4-66.
4-67.
4-68.
4-69.
Which of the following features of a
linear bus topology should be considered
an advantage?
1 .
2 .
3 .
4.
Signal interference when nodes are
too close to each other
System remains operable even when
one or more nodes fail
Very secure system
Very easy to run system diagnostics
from the LAN administrator
In which of the following network
topologies, if any, is each node
individually connected to the network
server?
1. Linear bus
2. Star
3. Ring
4. None of the above
Which of the following network access
methods requires each node to wait for
permission to transmit data?
1. CSMA
2. CSMA/CD
3. Token passing
4. Contention
On a network that uses the CSMA/CD
access method, which of the following
actions, if any, will be taken when a data
collision is detected?
1 .
2 .
3 .
4 .
The workstation will cease
transmission and wait until the line is
clear
The workstation will continue to
transmit data
The network server will assign the
next open time to the workstation that
suffered the collision
No action is taken; the data is lost
4-70.
In a LAN using a token ring topology,
the interface and protocols are defined by
which of the following IEEE standards?
1. IEEE 802
2. IEEE 802.3
3. IEEE 802.4
4. IEEE 802.5
4-71.
Which of the following LAN systems
uses a token ring topology and has a data
throughput of 4 Mbits and 16 Mbits per
second?
1. EtherNet
2. STARLAN
3. ARCnet
4. IBM Token Ring
IN ANSWERING QUESTIONS 4-72 THROUGH
4-74, SELECT FROM THE FOLLOWING LIST
THE NETWORK OPERATING SYSTEM
COMPONENT THAT PERFORMS THE
FUNCTION DESCRIBED IN THE QUESTION.
NOT ALL ITEMS IN THE LIST ARE USED.
A. Control kernel
B. Network interfaces
C. File systems
D. File extensions
4-72.
Provides low-level subnet protocols and
translation for bridging hardware drivers
with the network operating system.
1. A.
2. B.
3. C.
4. D.
4-73.
Controls data organization, storage, and
retrieval on the various storage systems
available to the network.
1. A.
2. B.
3. C.
4. D.
36