A logical bus topology
a. is always used by token ring protocol LANs
b. has all computers connected to each other in point-to-point connections
c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology
d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers
e. has a central control device, such as a mainframe
Ans: d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers
You might also like to view...
Which of the following is the newest and strongest Windows hash?
A. LANMAN B. NTLM C. NTLM2 D. NTLM3
?____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies.
A. ?Micro-marketing B. ?E-retailing C. ?VoIP D. ?EDI
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.
a. Distributed denial-of-service b. Smishing c. Logic bomb d. Phishing
____ is an e-retailer's process for packaging and shipping products.
A. Value-added networking B. Managed hosting C. Order fulfillment D. Dedicated hosting