21.05

ITESS 2 CHAPTER 2

1
What does the term media access control describe?
> the rules for coordinating the use of the medium
a list of users allowed to use the network
the system administrator's role in controlling access to the network
how to determine which media type is best for a network

2
Peer-to-peer and client/server networks share many characteristics. What is unique to the client/server environment?
Passwords may be required to access shared resources.
Local data files and devices can be shared by several users.
Computers typically communicate using request/response protocols.
> Security and resource management scales easily as the network grows.

3
What do transport layer protocols use to identify the application needed to process data?
> ports
MAC addresses
IP addresses
DNS
flags

4
What is one disadvantage of a client/server network?
> It can have a single point of failure.
It does not scale well to large networks.
It requires each user to be trained to perform administrative tasks.
It is less secure than a peer-to-peer network.

5
Which statement best describes a serial link?
> Bits of information are transmitted across the link one after another.
Bits of information are randomly transmitted across the link.
Bits of information are sent across a dedicated link in one direction only.
Bits of information are only sent using dial-up or ISDN lines.

6
Which network layer protocol enables routers to discover the best path between networks using hop count?
IP
> RIP
ARP
OSPF

7
Why are open source technologies appealing to many people?
A more organized source of funding and development is available.
Proprietary technologies involve cooperation between many companies.
De facto standards allow for more choice.
> Users are not bound by copyright laws.

8
What are two advantages of Windows over Linux? (Choose two.)
Windows can be used publicly for free.
> Windows is easier to use than Linux.
Unlike Linux, Windows is standardized through the efforts of many independent sources.
> Unlike Linux, Windows has an organized source of funding and development.

9
What is a major advantage of UTP?
> It is inexpensive.
It is highly resistant to electromagnetic interference.
It limits the number of hosts on a network.
It is an inexpensive way to interconnect remote locations.

10
Which of the following is the most popular physical LAN topology?
ring
> star
bus
fiber

11
Which statement is true of peer-to-peer networks?
They scale easily as the size of the network grows.
Security is easily maintained.
> Computers may change roles from client to server as needed.
At least one computer functions as a dedicated server.

12
Which access control method is specified in the IEEE 802.3 standard?
CSMA/CA
> CSMA/CD
token passing
store and forward

13
What is the physical topology when all the computers in a network connect to a central point?
point-to-point
> star
ring
bus

14
Which of the following works as a "storage and retrieval" application?
Telnet
> e-mail
DNS
SNMP

15
What is an advantage of Linux?
Linux is easy to use.
With copyrights, Linux experiences fast technological growth.
> Linux is free for public use.
Linux has an organized source of development.

16
Which of the following statements best describes full-duplex transmission?
Data can be sent across bus hubs and switches.
> Data can be simultaneously sent and received.
Data can only be sent in one direction.
Data can be sent and then received.

17
Which of the following statements is true of print sharing?
It requires a company to purchase more printers.
It makes it more difficult for an administrator to control printers.
> It allows for more efficient use of printers.
It limits the user to a single network printer.

18
Which DSL technology is most commonly used?
SDSL
> ADSL
VDSL
IDSL

19
Which features are LANs generally designed to accommodate?
> many users, high speed, limited geographical area
many users, high speed, broad geographical area
few users, low speed, limited geographical area
few users, low speed, broad geographical area

20
What is the purpose of protocols?
> to provide a controlled sequence of messages between systems
to define which users have access to the network
to allow the network administrator to decentralize control
to limit access to network resources

21
What is one advantage of directory and name services?
All directories are kept in a single location.
User names have a standardized format.
> Text names are easier to remember than numeric addresses.
Network resources are bound to a physical location.

22
Which two types of cabling will support 100BASE-X? (Choose two.)
Category 2
> Category 5
> two-strand fiber-optic
50-ohm coaxial

23
Which technology provides the best support for upload-intensive Internet tasks?
ISDN
> cable modem service
analog modem service
ADSL

^^(& terdapat 3 pertanyaan yang menanyakan tentang pendapat)

***nilai : 100.0%***

18.19

ITESS 2 CHAPTER 1

1
Though obsolete in current desktop environments, what are three valid reasons for the continued use of MS-DOS? (Choose three.)
> MS-DOS supports legacy applications.
MS-DOS is an intuitive, high-overhead operating system.
MS-DOS rarely crashes because it is a multitasking operating system.
> MS-DOS is relatively easy to use.
> MS-DOS can run on inexpensive hardware.

2
Which of the following is a valid concern for a company considering a move from Windows to Linux?
Linux generally allows companies to recycle old hardware and software.
> Users may need special training to become productive with Linux.
Special third party software may be necessary to secure and configure Linux.
Linux generally requires more disk space than Windows.

3
What are three reasons why a company may choose Linux over Windows as an operating system? (Choose three.)
> The entire Linux installation can be completed using either a GUI or CLI.
The entire Windows installation can be completed using either a GUI or CLI.
Windows can be run entirely from a CD.
> Compared to Windows, Linux is virtually virus-free.
> Linux is a true multi-user system.
Linux has superior one-dimensional security.

4
What is meant by the statement, "We have to support our legacy system"?
Support must be provided for the newest Linux system.
> Support must be provided for the system called legacy.
Support must be provided for the newest Microsoft system.
Support must be provided for outdated software.

5
Which two statements describe the security features of Linux? (Choose two.)
> Compared to Windows, Linux is virtually virus-free.
> Users must have a valid username and password to log into a Linux system, by default.
Linux security is one dimensional.
Most security features for Linux must be purchased from a third party.

6
Which two of the following shells are commonly available for Linux? (Choose two.)
Bore shell
> Korn shell
Cash shell
> C shell
PC shell

7
Which two of the following statements are true? (Choose two.)
Linux is a true 16-bit operating system that uses preemptive multitasking.
Linux supports all Windows applications through the use of cooperative multitasking.
> Linux operating system code is available for anyone to modify and use.
Linux is a true 48-bit operating system that uses minimal virtual memory.
> Linux is a true 32-bit operating system that uses preemptive multitasking.

8
From which Windows configuration tool can a user perform hardware and network configurations?
Window Manager
My Computer
> Control Panel
Task Manager

9
What is a beneficial feature of preemptive multitasking?
Applications share the use of the processor by time slicing.
The processor dynamically adjusts the amount of memory needed by the application programs.
Application programs share memory addresses and exchange information.
> The operating system controls the allocation of processor time.

10
Which of the following is generally regarded as the standard GUI for Linux?
Red Hat Desktop
CDE
> GNOME
Star Office
11
Which two statements describe security in the Windows operating system? (Choose two.)
Windows is less susceptible to viruses than Linux.
By default, users must have a username and password to log into Windows.
> Windows security is generally one dimensional.
> Windows security is improved through the use of third-party applications.
Windows can securely support multiple users with the Terminal service installed by default on personal computers.

12
Network operating systems were designed to provide which of the following tasks? (Select three.)
> file security
multitasking
> user privileges
resource access for a single user
> resource sharing among multiple users

13
When compared to a command line interface, what is a major disadvantage of a GUI?
It requires an understanding of commands.
> It requires more memory and storage space.
It is more difficult to use.
Most server operating systems do not support a GUI.

14
Which acronyms describe the two general categories of OS user interfaces?
DOS and UNIX
DOS and GUI
UNIX and GUI
> CLI and GUI

15
Windows and Linux both use a file system that resembles an upside-down tree. What is the name of this type of file structure?
binary
> hierarchical
empirical
subsystem

16
Which command is entered in the Run dialog box of a Windows XP system to open a command prompt window?
run
start
> cmd
dosprompt

17
Which three of the following file systems does Windows 2000 use? (Choose three.)
EXT2
> FAT16
> FAT32
> NTFS
HPFS

18
What is the main reason FAT32 was created?
New operating systems required the use of filenames greater than eight characters.
> Earlier versions of FAT used disk space inefficiently.
FAT32 was needed to support drives up to 4 GB.
The maximum length of file extensions needed to be increased to three characters.

19
Which part of the OS, loaded into memory at boot time, controls memory allocation?
user interface
application software
> kernel
file system

20
With the FAT file system, what is the basic unit of logical storage on a disk?
megabyte
> cluster
directory
logical drive

***nilai : 95.5%***