Switched backbone networks:
use a star topology with one device, usually a switch
Which of the following is true about the Ethernet (IEEE 802.3) data link protocol?
The correct answer is: Newer version permits jumbo frames
A “thin client” architecture approach:
The correct answer is: places all or almost all of the application logic on the server
ICMP is primarily used for ______________.
The correct answer is: error and diagnostic functions
A(n) _____ is used in a computer to connect it to a WLAN.
The correct answer is: wireless NIC
IPv4 uses _____ bytes per Internet address.
The correct answer is: 4
The acronym, MIME, refers to:
Multipurpose Internet Mail Extension
What is a handshaking protocol?
A protocol uses handshaking if the two communicating entities first exchange control packets before sending data to each other. SMTP uses handshaking at the application layer, While TCP uses three-way handshaking for supporting many applications.
Each of the circuits connected to a switch is a separate _____ circuit connecting the switch to a device on the network.
The correct answer is: point-to-point
IMAP (Internet Message Access Protocol):
The correct answer is: permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
With a client-based network, one fundamental problem is that:
The correct answer is: all data on the server must travel to the client for processing
The frequency ranges of some access points are the same as some cordless telephones.
The correct answer is 'True'.
_____ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
The correct answer is: Directory Services
The correct answer is: Directory Services
The correct answer is: protocol stack
Each entry of directory file has component(s) namely ____________.
The correct answer is: Both filename and inode number
Something that takes advantage of a vulnerability and leads to unintended behavior. (This behavior could be access, privileges, loss of data integrity, or denial of service on a computer system.)
The correct answer is: Exploit