Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Port#: SFTP (Simple File Transfer Protocol) |
|
Definition
|
|
Term
Port#: NNTP (Networ News Transfer Protocol) |
|
Definition
|
|
Term
Port#: Network Time Protocol (NTP) |
|
Definition
|
|
Term
Port#: NetBIOS Name Service |
|
Definition
|
|
Term
Port#: NetBIOS Datagram Service |
|
Definition
|
|
Term
Port#: Internet Mail Access Protocol (IMAP) |
|
Definition
|
|
Term
Port#: NetBIOS Session Service |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Which port is used by the File Transfer Protocol (FTP)? |
|
Definition
|
|
Term
Which port is used by the Network Time Protocol (NTP)? |
|
Definition
|
|
Term
Which protocol uses port 161? |
|
Definition
|
|
Term
Which port is used by the Point-to-Point Tunneling Protocol (PPTP)? |
|
Definition
|
|
Term
Which port is used by the Trivial File Transfer Protocol (TFTP)? |
|
Definition
|
|
Term
Which protocol uses port 25? |
|
Definition
|
|
Term
Which port is used by the Domain Naming Service (DNS)? |
|
Definition
|
|
Term
Which port is used by the HTTPS? |
|
Definition
|
|
Term
Which port is used by the Hyper Text Transfer Protocol (HTTP)? |
|
Definition
|
|
Term
Which protocol uses port 110? |
|
Definition
|
|
Term
Which port is used by the IMAP mail retrieval protocol? |
|
Definition
|
|
Term
Which port is used by the Windows Internet Naming Service (WINS)? |
|
Definition
|
|
Term
Which protocol uses port 23? |
|
Definition
|
|
Term
Which port is used by the Secure Shell (SSH) protocol? |
|
Definition
|
|
Term
Which port is used by the Simple File Transfer Protocol (SFTP)? |
|
Definition
|
|
Term
Which port is used by the File Transfer Protocol (FTP) for data tranport? |
|
Definition
|
|
Term
Which protocol uses port 119? |
|
Definition
|
|
Term
Which of the following protocols use port 389? |
|
Definition
|
|
Term
|
Definition
Also known as a tone generator, is a network tool that is used to isolate individual phone and network cables in a large bundle. The Fox is attached to the known end of the cable you want to locate. The Hound is then used on the bundled cables. When a tone is generated, you have found the other end of the same cable. |
|
|
Term
|
Definition
Also referred to as a wrap plugs, is a specially wired port connector that allows diagnostic software to test the port in question by sending data to the port and seeing if it comes back, in good condition, on the same port. |
|
|
Term
When faced with a network problem, what is the 8-step troubleshooting strategy that you should use? |
|
Definition
1. Establish the symptoms.
2. Identify the affected area.
3. Establish what has changed.
4. Select the most probable cause.
5. Implement the solution.
6. Test the result.
7. Recognize the potential effects of the solution.
8. Document the solution. |
|
|
Term
|
Definition
Logical Link Control (LLC) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
An 8-digit hexadecimal network address followed by a colon (:) and then the 12-digit hexadecimal MAC address of the host (0002BAF2:13BA241FF324). |
|
|
Term
Which firewall implementation uses three NICs? |
|
Definition
|
|
Term
|
Definition
allows the user to view current active connections and protocol-related statistics for the local host. |
|
|
Term
|
Definition
reports statistics and connections for NetBIOS over TCP/IP. |
|
|
Term
|
Definition
is used to gather and view the hardware addresses of local hosts and the default gateway. |
|
|
Term
|
Definition
is used to send test data packets to verify Internet Protocol (IP)-level connectivity. It sends an ICMP echo request to a target name or IP address. The resulting ICMP echo reply verifies that a TCP/IP configuration is set up properly and that the destination host is online. |
|
|
Term
|
Definition
uses Internet Control Message Protocol (ICMP) echo requests to trace the route a data packet takes to its destination. The tracert command reports the path taken, the routers (or hops) the packet passes through, the delay associated with the path, and any ICMP errors encountered. |
|
|
Term
|
Definition
Layer 7 - represents user applications, such as software for file transfers, for database access, and for e-mail. It handles general network access, flow control, and error recovery. |
|
|
Term
|
Definition
Layer 6 - determines data exchange formats and translates specific files from the Application layer format into a commonly recognized data format. It provides protocol conversion, data translation, encryption, character-set conversion, and graphics-command expansion. |
|
|
Term
|
Definition
Layer 5 - handles security and name recognition to enable two applications on different computers to communicate over the network. |
|
|
Term
|
Definition
Layer 4 - provides flow control, error handling, and is involved in correction of transmission/reception problems. It also breaks up large data files into smaller packets, combines small packets into larger ones for transmission, and reassembles incoming packets into the original sequence. |
|
|
Term
|
Definition
Layer 3 - addresses messages and translates logical addresses and names into physical addresses. It also manages data traffic and congestion involved in packet switching and routing. |
|
|
Term
|
Definition
Layer 2 - is the interface between the upper "software" layers and the lower "hardware" Physical layer. One of its main tasks is to create and interpret different frame types based on the network type in use. The Data Link layer is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer. |
|
|
Term
|
Definition
Layer 1 - is the specification for the actual hardware connection, the electronics, logic circuitry, and wiring that transmit the actual signal. |
|
|
Term
The IP address range of a Class C license is |
|
Definition
192.0.0.0 - 223.255.255.0 |
|
|
Term
The IP address range of a Class A license is |
|
Definition
|
|
Term
The IP address range of a Class B license is |
|
Definition
|
|
Term
The IP address range of a Class D license is |
|
Definition
224.0.0.0 - 239.255.255.25 |
|
|
Term
2 other names for client software |
|
Definition
redirector or requestor software |
|
|
Term
How many nodes are possible on an Ethernet network (10BaseT)? |
|
Definition
|
|
Term
Which network type is considered 'deterministic' and which is considered 'probablistic'? |
|
Definition
Token Ring is deterministic, and Ethernet is probablistic. |
|
|
Term
On which layer of the OSI Model do NICs operate? |
|
Definition
|
|
Term
Which of the 3 types of bounded network media does NOT support full-duplex? |
|
Definition
|
|
Term
What 4 benefits do Repeaters provide? |
|
Definition
1. They extend the distance that a network can cover.
2. They increase the number of nodes that can connect to the network.
3. They provide a measure of fault tolerance, limiting the impact of breaks to the segment on which the break occurs.
4. They can link different types of Ethernet cabling segments together. |
|
|
Term
What is the name for a Repeater on an Ethernet network using UTP? |
|
Definition
|
|
Term
At which OSI layer do repeaters & hubs operate? |
|
Definition
|
|
Term
At which OSI layer do Switches operate? |
|
Definition
|
|
Term
|
Definition
A type of Switch that stores a data packet in memory until it has been analyzed completely. It is then either forwarded to the appropriate port or discarded if it is found to be corrupt. |
|
|
Term
|
Definition
A type of Switch that forwards data packets as soon as the destination address has been determined. |
|
|
Term
At which OSI layer do routers operate? |
|
Definition
|
|
Term
What are the two Session layer protocols supported by TCP/IP? |
|
Definition
|
|
Term
Which two pieces of information does the Sockets protocol use to manage connections? |
|
Definition
|
|
Term
T/F? WINS servers only exist on Microsoft-based TCP/IP networks. |
|
Definition
|
|
Term
What were the two pre-DHCP protocols that also assigned IP addresses automatically? |
|
Definition
BOOTP
RARP (Reverse Address Resolution Protocol) |
|
|
Term
What is the special protocol used by the PING utility? |
|
Definition
ICMP (Internet Control Message Protocol) |
|
|
Term
What does 2B+D stand for? |
|
Definition
2 bearer (B) channels (64K or 128K) and 1 delta (D) channel. Provided with BRI (Basic Rate ISDN). |
|
|
Term
What are the specifications for PRI? |
|
Definition
Primary Rate ISDN provides 23B+D for 1.544Mbps in the US & 8-30B+ in Europe for up to 2Mbps. |
|
|
Term
Permanent Virtual Circuit (PVC) |
|
Definition
a technology used with Packet-Switched networks whereby it appears that you have exclusive access to the network, when in fact your data is sharing it with that of numerous other customers. |
|
|
Term
How many bytes are there in an ATM cell and how are they apportioned? |
|
Definition
53 bytes: 48 for data and 5 for the header. |
|
|
Term
|
Definition
Synchronous Optical NETwork |
|
|
Term
Synchronous Digital Hierarchy (SDH) |
|
Definition
the European version of SONET. |
|
|
Term
|
Definition
The SDH equivalent of SONET's OC-3 service (155.52Mbps) |
|
|
Term
What is the maximum distance allowed to the CO for a BRI link? |
|
Definition
|
|
Term
|
Definition
Serial Line IP:
-doesn't support NetBEUI or IPX/SPX
-required a static IP address |
|
|
Term
|
Definition
Password Authentication Protocol (dial-up connections & some VPN) |
|
|
Term
|
Definition
Challenge Handshake Authentication (dial-up connections & some VPN) |
|
|
Term
Which authentication protocol is required for digital certificates? |
|
Definition
Extensible Authentication Protocol (EAP) |
|
|
Term
What is the most obvious difference between the UNIX Traceroute utility and the Windows Tracert utility? |
|
Definition
Tracert's output places the response time at the beginning while Traceroute places it at the end. |
|
|
Term
Which network device is used to create a VLAN? |
|
Definition
|
|
Term
Name 3 packet-switching technologies. |
|
Definition
X.25, Frame Relay, and Ethernet |
|
|
Term
Which command refreshes the list of NetBIOS names that are registered on the local client computer? |
|
Definition
|
|
Term
What are the maximum range and speed of 802.11b? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
uses single-mode fiber-optic cable and supports a maximum cable length of 40 kilometers. |
|
|
Term
|
Definition
uses multimode fiber-optic cable and supports a maximum cable length of 300 meters. |
|
|
Term
|
Definition
uses single-mode fiber-optic cable and supports a maximum cable length of 10 kilometers. |
|
|
Term
The 802.1x security protocol requires which 3 components? |
|
Definition
authentication server
authenticator
supplicant |
|
|
Term
What is the typical data throughput rate of infrared devices? |
|
Definition
|
|
Term
Which command would you use to troubleshoot name resolution problems on a Linux-based client computer? |
|
Definition
|
|
Term
Token Ring can be implemented using which cable types? |
|
Definition
|
|
Term
What does the -w switch do for the ping command? |
|
Definition
Allows you to specify the timeout period in milliseconds. |
|
|
Term
|
Definition
uses single-mode fiber-optic cable and supports cable lengths up to five kilometers. |
|
|
Term
What is the maximum baud rate of standard Plain Old Telephone Service (POTS) line? |
|
Definition
|
|
Term
What would you install on your Mac OS X server to provide File Transfer Protocol (FTP) services on the network? |
|
Definition
|
|
Term
Universal Serial Bus (USB) 1.1 devices can transfer data at up to which speed? |
|
Definition
|
|
Term
Which two routing protocols does Transmission Control Protocol/Internet Protocol (TCP/IP) use? |
|
Definition
Open Shortest Path First (OSPF)
Router Information Protocol (RIP) |
|
|
Term
File and Print Services for NetWare (FPNW) |
|
Definition
A Windows service that allows a NetWare client to access files and printers on Windows servers. The Windows server appears to be a NetWare server to the NetWare client. |
|
|
Term
Gateway Services for NetWare (GSNW) |
|
Definition
allows Windows clients that do not have NetWare client software to connect to NetWare servers by going through a Windows server running this service. GSNW translates Windows requests (also known as Server Message Block (SMB) requests) into NetWare requests (also known as NetWare Core Protocol (NCP) requests). |
|
|
Term
Client Services for NetWare (CSNW) |
|
Definition
allows a Windows workstation to use NetWare accounts to access NetWare servers. |
|
|
Term
Microsoft Client for NetWare Networks |
|
Definition
The networking component of Windows 95/98/NT that allows a user to log on to a NetWare server. |
|
|
Term
What functions as a print server on a system that is sharing a printer on a UNIX network? |
|
Definition
LPD
Printer sharing in a UNIX environment consists of two parts: Line Printer Daemon (LPD) and Line Printer Remote (LPR). LPD functions as a print server on the system sharing the printer, and LPR runs on the client system that accesses the printer. |
|
|
Term
Which wireless standard is the least likely to experience interference from common items such as microwave ovens? |
|
Definition
|
|
Term
Microsoft Services for Macintosh |
|
Definition
allows Macintosh clients to access resources on the Windows servers with that service installed and to store files in their native Macintosh format on those servers. |
|
|
Term
A network node using Wired Equivalent Privacy (WEP) is identified by its: |
|
Definition
Media Access Control (MAC) address |
|
|
Term
|
Definition
(Thicknet) is a coaxial cable with a maximum speed of 10 megabits per second (Mbps) and a maximum transmission distance of 500 meters per segment. |
|
|
Term
|
Definition
(Thinnet) is a coaxial cable with a maximum speed of 10 Mbps and a maximum transmission distance of 185 meters per segment. |
|
|
Term
|
Definition
is an unshielded twisted pair (UTP) cable with a maximum speed of 10 Mbps and a maximum transmission distance of 100 meters per segment. |
|
|
Term
|
Definition
is a shielded or unshielded twisted pair cable with a maximum speed of 100 Mbps and a maximum transmission distance of 100 meters per segment. |
|
|
Term
|
Definition
is a fiber-optic cable with a maximum speed of 100 Mbps and a maximum transmission distance of 2,000 meters. |
|
|
Term
|
Definition
(Gigabit Ethernet) is a multimode fiber-optic cable with a maximum speed of 1,000 Mbps and a maximum transmission distance of 260 meters. |
|
|
Term
|
Definition
(Gigabit Ethernet) is a category 5 UTP cable with a maximum speed of 1,000 Mbps and a maximum transmission distance of 100 meters. |
|
|
Term
Which wide area network (WAN) technology supports a data rate of 43 megabits per second (Mbps)? |
|
Definition
|
|
Term
What provides a secure terminal connection to a remote host? |
|
Definition
|
|
Term
What is the maximum throughput rate of CAT 3 cable? |
|
Definition
|
|
Term
Which security protocol is best suited for supporting protocols such as Internetwork Packet Exchange (IPX) and AppleTalk on a virtual private network (VPN) over the Internet? |
|
Definition
L2TP
is a combination of Microsoft's PPTP protocol and Cisco's Layer 2 Forwarding (L2F) technology that operates at the Data Link layer and, therefore, supports many different protocols. It supports non-Transmission Control Protocol/Internet Protocol (TCP/IP) protocols on VPNs over the Internet. It is useful for connections between two different types of networks, such as Netware (IPX) and Macintosh (AppleTalk), over the Internet. |
|
|
Term
|
Definition
provides a maximum throughput of 11 Mbps and a maximum range of 300 feet. |
|
|
Term
|
Definition
provides a maximum throughput of 2 Mbps and a maximum range of 150 feet. |
|
|
Term
|
Definition
provides a maximum throughput of 54 Mbps and a maximum range of 150 feet. |
|
|
Term
|
Definition
provides a maximum throughput of 54 Mbps and a maximum range of 300 feet. |
|
|
Term
On which type of network does each host randomly assign itself an 8-bit node ID? |
|
Definition
|
|
Term
Which backup types do not change or turn off the archive bit of files? |
|
Definition
daily/daily copy
differential
copy |
|
|
Term
At which OSI layer does a WAP that doesn't do any routing or bridging operate? |
|
Definition
|
|
Term
Which network device is used to create a VLAN? |
|
Definition
|
|
Term
What is used to transmit data through a multimode fiber-optic (MMF) cable? |
|
Definition
light-emitting diodes (LEDs) |
|
|
Term
What does a solid amber status light on a NIC indicate? |
|
Definition
A problem with the NIC (or possibly the system board). |
|
|
Term
|
Definition
A Demilitarized Zone is a separate zone inside the network that is behind the firewall but still accessible over the Internet. The firewall would use a separate network interface card (NIC) for each different network: one for the Internet connection, one for the DMZ, and one for the private network. |
|
|
Term
What component enables a Macintosh client to access a Windows NT network? |
|
Definition
Services for Macintosh module installed on the NT server. |
|
|
Term
|
Definition
provides authentication and encryption over the Internet. It works at the Network layer and secures all applications that operate at higher layers (Layer 4 and above). It is widely supported. |
|
|
Term
At which two layers of the OSI model can switches operate? |
|
Definition
|
|
Term
Which Internet access technology provides considerably higher download speeds than upload speeds? |
|
Definition
|
|
Term
An add-on remote access server for NetWare that provides secure access to the network. |
|
Definition
|
|
Term
T/F? Mac OS X provides native support for Windows clients. |
|
Definition
|
|
Term
The ISDN Primary Rate Interface (PRI) |
|
Definition
uses 23 B channels and one 64 kilobits per second (Kbps) D channel for a total of 24 channels, which together provide full T1 speeds of 1.544 Mbps. |
|
|
Term
The ISDN Basic Rate Interface service (BRI) |
|
Definition
uses two 64 Kbps B channels for application data and one 16 Kbps D channel for management and signal data. The total bandwidth is 144 Kbps, but only 128 Kbps is used for data transfer. |
|
|
Term
Which protocol is used to secure file transfer across an unsecured network? |
|
Definition
Secure Copy (SCP) uses Secure Shell (SSH) to provide secure file transfer. |
|
|
Term
Which Windows component provides access to files and printers hosted on Windows servers to NetWare clients? |
|
Definition
File and Print Services for NetWare |
|
|
Term
Which category of unshielded twisted pair (UTP) provides bandwidth of over 100 megahertz (MHz)? |
|
Definition
CAT 6
CAT 6 cable supports 200-250 MHz of bandwidth.
CAT 3 cable supports 16 MHz of bandwidth.
CAT 5 cable supports 100 MHz of bandwidth.
CAT 5e cable supports 100 MHz of bandwidth. |
|
|
Term
What service enables the transparent exchange of files between servers and clients on a Microsoft network? |
|
Definition
Server Message Block (SMB) |
|
|
Term
F-type connectors are used with which cable type? |
|
Definition
75-ohm coaxial cable
F-type connectors are used with 75-ohm coaxial cable and are most commonly used in consumer electronics, such as cable boxes and VCRs. 75-ohm coaxial cable is starting to become more common in networking technologies. For instance, the connections between an Internet satellite modem and satellite dish use 75-ohm coaxial cable and F-type connectors. |
|
|
Term
What device can you use to test the cable runs and print a record of the results |
|
Definition
|
|
Term
What layer provides network services such as file transfer, terminal emulation, network management, and mail service to the user |
|
Definition
Application
Think: user = GUI = application |
|
|
Term
1000BASE-SX uses which cable type? |
|
Definition
|
|
Term
Windows XP provides support for which Extensible Authentication Protocol (EAP) types |
|
Definition
EAP Transport Layer Security (EAP-TLS)
EAP Message Digest Algorithm/Challenge-Handshake Authentication Protocol (EAP-MD5) |
|
|
Term
Which component would allow a Windows computer to act as a Network File System (NFS) client or server? |
|
Definition
Microsoft Windows Services for UNIX |
|
|
Term
When implemented, which service enables devices to use IP communications without the need for static IP configuration, dynamic IP configuration, or DNS? |
|
Definition
Zero Configuration (Zeroconf) |
|
|
Term
What is used to resolve a computer's Internet Protocol (IP) address when only its Media Access Control (MAC) address is known? |
|
Definition
Reverse Address Resolution Protocol (RARP) |
|
|
Term
The Bluetooth wireless standard operates at which frequency? |
|
Definition
|
|
Term
Using the ad-hoc wireless network mode that is specified in the 802.11x standard enables you to design which type of network topology? |
|
Definition
|
|
Term
Which 5 TCP/IP properties are configurable by a DHCP server? |
|
Definition
1. IP Address
2. Subnet Mask
3. Default Gateway
4. DNS Server -or-
5. WINS Server |
|
|
Term
How many nodes are allowed on a 10base2 segment? |
|
Definition
|
|
Term
What is the maximum cable length supported by 1000BASE-CX? |
|
Definition
|
|
Term
Wi-Fi Protected Access (WPA) is more secure than Wired Equivalent Privacy (WEP) because it uses: |
|
Definition
Extensible Authentication Protocol (EAP), which supports the use of a username and password. It also uses encryption keys that are private and dynamic.
WEP is less secure because it uses static, shared encryption keys and bases identification on MAC addresses. |
|
|
Term
What is the private IP range for a Class A network? |
|
Definition
10.0.0.0 through 10.255.255.255 |
|
|
Term
What is the private IP range for a Class B network? |
|
Definition
172.16.0.0 through 172.31.255.255 |
|
|
Term
What is the private IP range for a Class C network? |
|
Definition
192.168.0.0 through 192.168.255.255 |
|
|
Term
What are the 5 questions to ask for subnetting? |
|
Definition
1. How many subnets will the mask create?
2. How many hosts per subnet?
3. What are the valid subnets?
4. What is the broadcast address for each subnet?
5. What are the valid host IDs for each subnet? |
|
|
Term
How does one calculate the number of subnets that can be created from a given subnet mask? |
|
Definition
2^X - 2, where X = # of borrowed host bits.
For example with a subnet mask of 255.255.255.224 (/27), there are 3 borrowed network bits available.
2^3 - 2 = 8 - 2 = 6 possible subnets. |
|
|
Term
How does one determine the number of valid hosts per subnet for a given mask? |
|
Definition
2^Y - 2, where Y = the number of host bits available.
For example with a subnet mask of 255.255.255.224 (/27), there are 5 host bits available (after borrowing 2 for the subnets).
2^5 - 2 = 32 - 2 = 30 hosts per subnet. |
|
|
Term
How does one determine the broadcast address for each subnet? |
|
Definition
It's the last host number before the next subnet.
For example with a subnet mask of 255.255.255.224 (/27), the subnets would be 32, 64, 96, 128, 160 and 192. So the broadcast addresses for these subnets would be:
32 = 63, 64 = 95, 96 = 127, 128 = 159, and 192 = 223 |
|
|
Term
How does one determine the valid host IDs for a given subnet? |
|
Definition
The valid host IDs are the numbers between the subnet address and the broadcast address.
For example with a subnet mask of 255.255.255.224 (/27), the subnets would be:
32, 64, 96, 128, 160 and 192. The broadcast addresses for these subnets would be:
63, 95, 127, 159, 191 and 223.
So the valid host range for each subnet would be: 33-62, 65-94, 97-126, 129-158, 161-190 and 193-222. |
|
|
Term
|
Definition
FHSS (Frequency Hopping Spread Spectrum) at 2.1 Mbps |
|
|
Term
Which frame type is the default in a network with Netware version 3.12 and 4.x servers? |
|
Definition
|
|
Term
Which frame type is the default prior to Netware version 3.12? |
|
Definition
|
|
Term
At which OSI layer does ICMP operate? |
|
Definition
|
|
Term
Which OSI layer defines bit synchronization? |
|
Definition
|
|
Term
Which OSI layer defines the physical address? |
|
Definition
|
|
Term
How does one determine the valid subnets for a given mask? |
|
Definition
256 - subnet mask = block size or increment number. Then using that number, increment starting with the number itself until you reach the number just before the subnet mask value.
For example with a subnet mask of
255.255.255.224: 256 - 224 = 32. So the subnets would be 32, 64, 96, 128, 160, 192 |
|
|
Term
How many subnets and hosts/subnet does a Class B /25 subnet mask create? |
|
Definition
510 subnets
126 hosts/subnet |
|
|
Term
How many subnets and hosts/subnet does a Class B /23 subnet mask create? |
|
Definition
126 subnets
510 hosts/subnet |
|
|
Term
|
Definition
Packet Assembler/Disassembler - device used to connect a system to a X.25 packet-switched network. |
|
|
Term
What are the 2 main enhancements of Netware 4.x over 3.x? |
|
Definition
1. NDS - Novell Directory Services provided centralized user authentication and resource info. 2. 'Encapsulation' - whereby IPX/SPX packets can be put into TCP/IP packets. |
|
|
Term
Which client software that ships with Windows 9x enables access to Novell Netware servers using NWLink? |
|
Definition
Microsoft Client for NetWare Networks. |
|
|
Term
What is the Novell client called that enables a PC to access NetWare servers? |
|
Definition
Client32 - it supports NDS and both IPX/SPX and TCP/IP. The Microsoft client that ships with Windows 9x only support the Bindery and NWLink. |
|
|
Term
What is the name of the client software for Novell networks that ships with Windows NT Workstation? |
|
Definition
Client Services for NetWare (CSNW). Doesn't support TCP/IP or NDS (fully). |
|
|
Term
What is the name of Apple's proprietary network cable system? |
|
Definition
|
|
Term
Which remote access protocol only supports TCP/IP and uses a static IP address? |
|
Definition
SLIP (Serial Line Internet Protocol) |
|
|
Term
How many hosts can exist on a class B network? |
|
Definition
|
|
Term
Which two terms are applied to the division and distribution of a NetWare NDS e-Directory tree? |
|
Definition
|
|