Networking – Section 4

31. MAC is

A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique or multiple-access transmission media
C. a very common bit-oriented data link protocol issued to ISO.
D. network access standard for connecting stations to a circuit-switched network
E. None of the above

Correct Answer: A. a method of determining which device has access to the transmission medium at any time

32. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?

A. Teleport
B. Modem
C. Multiplexer
D. Concentrator
E. None of the above

Correct Answer: B. Modem

33. You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?

A. 255.255.192.0
B. 255.255.224.0
C. 255.255.240.0
D. 255,255.248.0
E. 255.255.252.0

Correct Answer: E. 255.255.252.0

34. Which application allows a user to access and change remote files without actual transfer?

A. TELNET
B. NFS
C. FTP
D. DNS
E. None of the above

Correct Answer: B. NFS

35. Parity bit is

A. an error-detecting code based on a summation operation performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the sum of all the binary digits.
C. a code in which each expression conforms to specific rules of construction so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected
D. the ratio of the number of data units in error to the total number of data units
E. None of the above

Correct Answer: B. a check bit appended to an array of binary digits to make the sum of all the binary digits.

Leave A Comment?

five × 2 =