634 multi final – Flashcards

Unlock all answers in this set

Unlock answers
question
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer
answer
Answer: B
question
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer
answer
Answer: B
question
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model. a. data link and network b. session, presentation and application c. application layer d. application and presentation e. network, transport and presentation
answer
Answer: B
question
The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer
answer
Answer: d
question
Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers
answer
Answer: B
question
As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers
answer
Answer: E
question
Which of the following is true with respect to the data link layer? a. It accepts streams of bits from the application layer. b. It is responsible for getting a message from one computer to another (one node to another) without errors. c. It does not perform error detection. d. It performs routing functions. e. It organizes data from the physical layer and passes these coherent messages to the application layer.
answer
Answer: B
question
The ____________ layer of the OSI model is responsible for data format translation. a. session b. presentation c. physical d. application e. transport
answer
Answer: B
question
The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation
answer
Answer: B
question
In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link
answer
Answer: B
question
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.
answer
Answer: True
question
Which of the following is not true about formal standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body.
answer
Answer: A
question
The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor
answer
Answer: B
question
Which of the following is not true about de facto standards? a. They never evolve into formal standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace.
answer
Answer: A
question
__________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets
answer
Answer: B
question
The three stages of the formal standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above.
answer
Answer: A
question
Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks
answer
Answer: A
question
Pervasive networking means that: a. the five-layer network model will be used to design all networks b. all networks of the future will be developed by a monopolistic organization c. the cost of computers will be higher in the future d. virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates e. cable companies will offer more than 150 network selections for viewers
answer
Answer: D
question
Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks
answer
Answer: A
question
The integration of voice, video, and data communications is also known as __________. a. convergence b. peer-to-peer networks c. metropolitan wide networks d. regional bell operating company e. intranet
answer
Answer: A
question
The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.
answer
Answer: True
question
One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
answer
Answer: B
question
With respect to costs for a client-server network, which of the following is true? a. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power. b. More network capacity, which costs more money, is required for client-server networks than for client-based networks. c. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper. d. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client. e. None of the above
answer
Answer: C
question
A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
answer
Answer: C
question
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software
answer
Answer: B
question
With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic
answer
Answer: D
question
With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic. a. Application; presentation b. Presentation; data access c. Data access; presentation d. Application; data access e. Presentation; application storage
answer
Answer: B
question
How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server
answer
Answer: C
question
In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer
answer
Answer: C
question
Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures
answer
Answer: C
question
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n
answer
Answer: B
question
In the three tier architecture the software on the client computer is responsible for____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage
answer
Answer: A
question
An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
answer
Answer: A
question
One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered
answer
Answer: D
question
The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher
answer
Answer: B
question
Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla
answer
Answer: B
question
To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package
answer
Answer: A
question
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library
answer
Answer: D
question
Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML
answer
Answer: C
question
IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
answer
Answer: E
question
Which is not a function of the physical layer: a. transmission of bits. b. defining the rules by which one and zeroes are transmitted. c. providing error-free transmission of data. d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass though it.
answer
Answer: C
question
____________ refers to the transmission characteristics of the circuit. a. handshaking b. virtual circuit c. bonding d. logical circuit e. physical circuit
answer
Answer: D
question
Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors.
answer
Answer: A
question
Transmission speeds: a. are the same among all media b. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands c. are a constant, 56Kbps, for all media types d. differ widely among media e. always have a direct correlation with security
answer
Answer: D
question
___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling
answer
Answer: E
question
With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal
answer
Answer: C
question
Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal
answer
Answer: C
question
To get more "bandwidth" in a digital transmission, you must: a. increase the range of frequencies available for a transmission b. increase the loudness per transmission c. decrease the bits per second transmission speed d. increase the phase shifts per transmission e. increase the baud rate per transmission
answer
Answer: A
question
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator
answer
Answer: C
question
_________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan
answer
Answer: C
question
A(n) __________ circuit is another name for a multipoint configuration. a. analog b. dedicated c. point-to-point d. shared e. simplex
answer
Answer: D
question
Which is not true about point-to-point circuits? a. point-to-point circuits are dedicated to the use of the two computers. b. point-to-point circuits are more expensive than multipoint circuits. c. point-to-point circuits are called dedicated circuits. d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits. e. point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit.
answer
Answer: D
question
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
answer
Answer: B
question
Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit
answer
Answer: A
question
Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital
answer
Answer: B
question
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital
answer
Answer: C
question
The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed
answer
Answer: B
question
Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics
answer
Answer: D
question
__________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic
answer
Answer: B
question
The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire
answer
Answer: C
question
The earliest type of fiber optic systems were: a. Graded index multimode b. Attenuated c. Multimode d. Single mode e. Step mode
answer
Answer: C
question
Which of the following media can best withstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted pair d. coaxial cable e. fiber optic cable
answer
Answer: E
question
Which of the following media has the lowest error rates and the highest transmission speeds? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared
answer
Answer: D
question
Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair
answer
Answer: A
question
Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media
answer
Answer: C
question
Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable
answer
Answer: A
question
Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit
answer
Answer: d
question
Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics
answer
Answer: D
question
Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above
answer
Answer: E
question
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024
answer
Answer: E
question
____________ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM
answer
Answer: A
question
The representation of the character A by the group of 8 bits, 01000001, is an example of: a. digital coding b. phase modulation c. binary modulation d. analog transmission e. pitch variation
answer
Answer: A
question
When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex
answer
Answer: A
question
Which of the following statements is correct? a. Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b. Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c. Parallel transmission is only used for analog data. d. Serial transmission is slower than parallel transmission. e. Parallel transmission is the same as serial transmission.
answer
Answer: D
question
Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal
answer
Answer: C
question
With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal
answer
Answer: C
question
___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling
answer
Answer: E
question
With respect to converting digital data into analog signals, AM stands for: a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic
answer
Answer: C
question
In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins? a. bandwidth modulation b. amplitude modulation c. frequency modulation d. phase modulation e. codec modulation
answer
Answer: D
question
____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol. a. quadrature amplitude modulation b. time division multiplexing c. synchronous digital line control d. pulse code modulation e. baseband signaling
answer
Answer: A
question
The direction in which the sound wave begins is known as: a. amplitude, which our ears detect as loudness b. frequency, which our ears detect as pitch c. phase d. bandwidth e. furlong
answer
Answer: C
question
The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong
answer
Answer: C
question
_____________ is not a form of modulation used to transform digital data into analog signals. a. synchronous time division b. amplitude shift keying c. amplitude modulation d. frequency modulation e. phase modulation
answer
Answer: A
question
____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a. digitizing. b. sampling c. modulation d. demodulation e. shaping
answer
Answer: C
question
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer
answer
Answer: A
question
Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec
answer
Answer: A
question
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator
answer
Answer: C
question
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal
answer
Answer: B
question
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer
answer
Answer: A
question
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer
answer
Answer: A
question
Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal
answer
Answer: B
question
Inverse multiplexing means: a. combining several low speed circuits to enable them to be transmitted across one high speed circuit b. multiplexing from the terminal to the host, rather than from the host to the terminal c. combining high speed circuits to enable them to be transmitted across one low speed circuit d. inverting the frequencies used for transmission across a low speed circuit for switching to a digital circuit e. multiplexing to a codec, rather than to a modem
answer
Answer: A
question
____________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control
answer
Answer: C
question
Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling
answer
Answer: B
question
Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
answer
Answer: E
question
In general, controlled approaches: a. work better than contention approaches for small networks that have low usage b. work better than contention approaches for large networks that have high usage c. work better than contention approaches for all sizes of networks d. do not require a host, server, or active monitor to assign media access control e. have many collisions
answer
Answer: B
question
Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider
answer
Answer: D
question
CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance
answer
Answer: C
question
Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit
answer
Answer: A
question
________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC
answer
Answer: B
question
Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
answer
Answer: E
question
Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting
answer
Answer: B
question
With contention: a. computers wait until the circuit is free before they send data b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media c. the front end processor must wait for a response from the polled client or terminal d. one computer starts the poll and passes it to the next computer on the multipoint circuit e. there is never a chance for "collision," or two computers trying to send data at the same time
answer
Answer: A
question
Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networks d. only due to Gaussian noise e. only due to lightning strikes
answer
Answer: B
question
Another term for impulse noise is: a. Gaussian noise b. spikes c. attenuation d. cross-talk e. intermodulation noise
answer
Answer: B
question
The familiar background static on radios and telephones is called: a. echoes b. intermodulation noise c. line outages d. cross-talk e. white noise
answer
Answer: E
question
The primary source of error in data communications is: a. echoes b. intermodulation noise c. spikes d. jitter e. cross-talk
answer
Answer: C
question
__________can obliterate a group of bits, causing a burst error. a. Crosstalk b. Attenuation c. Impulse noise d. Intermodulation noise e. Jitter
answer
Answer: C
question
Cross-talk: a. occurs when one circuit picks up signals in another b. is always bothersome because it has a high signal strength c. decreases with increased proximity of two wires d. decreases during wet or damp weather e. increases with lower frequency signals
answer
Answer: A
question
When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. jitter b. echo c. crosstalk d. attenuation e. impulse noise
answer
Answer: B
question
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is: a. jitter b. spiking c. attenuation d. intermodulation noise e. echo
answer
Answer: C
question
If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of: a. intermodulation noise b. attenuation c. echo d. jitter e. harmonic distortion
answer
Answer: A
question
When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________. a. intermodulation noise b. attenuation c. echo d. jitter e. harmonic distortion
answer
Answer: E
question
A phase hit is likely to be: a. spikes b. a short term shift out of phase c. intermodulation noise d. white noise e. Gaussian noise
answer
Answer: B
question
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit
answer
Answer: A
question
_____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit
answer
Answer: C
question
Which of the following is way to reduce or eliminate crosstalk on a circuit, a. changing multiplexing techniques b. adding repeaters or amplifiers to a circuit c. reducing the length of the cable d. adding fluorescent lights e. shorting a circuit
answer
Answer: A
question
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. modems
answer
Answer: B
question
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect? a. 0110101 1 b. 0001101 1 c. 0010010 1 d. 1011011 0 e. 1111111 0
answer
Answer: B
question
The probability of detecting an error, given that one has occurred, using parity checking is about: a. 100% b. 0% c. 50% d. 75% e. 98%
answer
Answer: C
question
Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity b. about 70% for even parity and 30% for odd parity c. about 30% for even parity and 70% for odd parity d. about 0% for either even or odd parity e. about 100% for either even or odd parity
answer
Answer: A
question
ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality
answer
Answer: A
question
______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message. a. Hamming code b. Huffman encoding c. Front end processing d. Wave division multiplexing e. Hub polling
answer
Answer: A
question
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. a. open window b. halt and be recognized (HBR) c. sliding window d. stop and wait e. continuous
answer
Answer: D
question
With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR)
answer
Answer: A
question
Asynchronous transmission: a. is used to transmit each character simultaneously with all other characters b. has a pre-determined, fixed time between sending characters c. is typically used on multipoint half duplex circuits d. uses a continuous series of start bits as an idle signal e. is also known as start-stop transmission
answer
Answer: E
question
Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a time c. uses start bits before each character to be sent d. uses stop bits after each character to be sent e. is used to transmit a "frame" or "packet" of data at a time
answer
Answer: E
question
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection a. ACK b. NAK c. SYN d. ARQ e. FIN
answer
Answer: C
question
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP
answer
Answer: C
question
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection
answer
Answer: D
question
Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva
answer
Answer: C
question
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer
answer
Answer: B
question
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer
answer
Answer: B
question
Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it
answer
Answer: d
question
__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer
answer
Answer: C
question
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings
answer
Answer: D
question
what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request
answer
Answer: D
question
A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
answer
Answer: B
question
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection
answer
Answer: A
question
Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation
answer
Answer: B
question
The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer
answer
Answer: d
question
The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP
answer
Answer: E
question
As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers
answer
Answer: E
question
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link
answer
Answer: B
question
_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25
answer
Answer: D
question
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox
answer
Answer: A
question
IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions
answer
Answer: D
question
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request
answer
Answer: D
question
TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures
answer
Answer: B
question
A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte
answer
Answer: D
question
The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer.
answer
Answer: C
question
TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value
answer
Answer: B
question
The newer form of IP, version 6 (Ipv6) is: a. running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header
answer
Answer: C
question
The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit
answer
Answer: B
question
A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
answer
Answer: B
question
_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net
answer
Answer: D
question
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection
answer
Answer: A
question
______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented
answer
Answer: C
question
The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing
answer
Answer: E
question
A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network
answer
Answer: A
question
With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR)
answer
Answer: A
question
With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses
answer
Answer: A
question
A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO
answer
Answer: A
question
___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding
answer
Answer: C
question
Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service
answer
Answer: E
question
_________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request
answer
Answer: A
question
A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net
answer
Answer: B
question
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255
answer
Answer: D
question
Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks
answer
Answer: E
question
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet
answer
Answer: D
question
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
answer
Answer: C
question
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet
answer
Answer: A
question
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet
answer
Answer: B
question
___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing
answer
Answer: A
question
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table
answer
Answer: B
question
The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing
answer
Answer: E
question
An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing
answer
Answer: C
question
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing
answer
Answer: C
question
_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing
answer
Answer: D
question
One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.
answer
Answer: C
question
_____________ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information. a. Resource sharing b. User grouping c. User profiling d. Information sharing e. Data pirating
answer
Answer: D
question
____________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs. a. Software metering b. Information sharing c. Resource sharing d. Software pirating e. Network routing
answer
Answer: C
question
Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks
answer
Answer: B
question
A peer-to-peer LAN: a. has more capability than a dedicated server b. supports a higher number of computers than a dedicated server c. is generally cheaper in hardware and software than a dedicated server d. is not appropriate for sharing resources in a small LAN e. is often much faster than dedicated server networks
answer
Answer: C
question
Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system
answer
Answer: B
question
A(n) _____________ is required to connect a computer to WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
answer
Answer: C
question
Which of the following is not a critical software component in a dedicated server LAN? a. application software on server computers b. network operating system in the dedicated server c. network communication software on the client d. LAN metering software e. application software on client computers
answer
Answer: D
question
_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System
answer
Answer: A
question
The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system
answer
Answer: A
question
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list
answer
Answer: C
question
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services
answer
Answer: B
question
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection
answer
Answer: D
question
Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva
answer
Answer: C
question
___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control
answer
Answer: B
question
The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected
answer
Answer: B
question
A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe
answer
Answer: D
question
Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting
answer
Answer: B
question
Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling
answer
Answer: B
question
CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance
answer
Answer: C
question
Switched Ethernet: a. always has a lower capacity than shared Ethernet. b. operates at 50% of capacity before performance becomes a problem. c. operates at about 95% of capacity before performance becomes a problem. d. is affected by the increased collisions caused by using a switched LAN design. e. decreases network performance because each computer is connected via a common multipoint circuit.
answer
Answer: C
question
Switched Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously
answer
Answer: E
question
Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.
answer
Answer: A
question
Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE
answer
Answer: A
question
Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines
answer
Answer: D
question
Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia
answer
Answer: C
question
Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times
answer
Answer: D
question
Which of the following is not an advantage of a WLAN? a. The ability to use the network in places where it is impractical to install a wired network. b. WLANs enable mobile users to work at different locations within an office building and stay connected to the network. c. WLANs enable business travelers to connect the Internet from within waiting areas. d. WLANs allow users to work more securely than a wired LAN. e. WLANs cost less to install and operate in most cases (except new buildings) than wired networks.
answer
Answer: D
question
A(n) _____________ is required to connect a computer to WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
answer
Answer: C
question
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
answer
Answer: D
question
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
answer
Answer: B
question
A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails
answer
Answer: B
question
A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits.
answer
Answer: A
question
Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair
answer
Answer: A
question
Which of the following is not a type of hardware device that can be used to interconnect networks? a. switches b. routers c. multiprotocol routers d. 'dumb' terminals e. gateways
answer
Answer: D
question
Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable
answer
Answer: C
question
Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer
answer
Answer: D
question
Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet
answer
Answer: A
question
Gateways: a. process all messages, even if the messages are not explicitly addressed to them b. can translate one network protocol into another c. are less complex than bridges d. are most often used as the interface between two or more networks that have similar data link and network layer protocols e. cannot perform a routing function
answer
Answer: B
question
Which of the following devices is the most complex? a. Gateway b. Router c. Layer 3 switches d. Switch e. Multiprotocol router
answer
Answer: A
question
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type? a.) Switch b.) Router c.) Gateway d.) Hub e.) NIC
answer
Answer: C
question
Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based
answer
Answer: A
question
With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack
answer
Answer: E
question
Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches
answer
Answer: A
question
A metropolitan area network is: a. a high speed central network, built with privately owned media, which connects other networks in a distance spanning up to several miles. b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits. d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 543.56 miles with private media.
answer
Answer: C
question
Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses lease lines from IXCs like ATT, MCI, Sprint.
answer
Answer: D
question
ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality
answer
Answer: A
question
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs
answer
Answer: A
question
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design
answer
Answer: C
question
Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh
answer
Answer: C
question
Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user
answer
Answer: A
question
At the top of the Internet structure are national ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines
answer
Answer: B
question
Which of the following is not an advantage of a WLAN? a. The ability to use the network in places where it is impractical to install a wired network. b. WLANs enable mobile users to work at different locations within an office building and stay connected to the network. c. WLANs enable business travelers to connect the Internet from within waiting areas. d. WLANs allow users to work more securely than a wired LAN. e. WLANs cost less to install and operate in most cases (except new buildings) than wired networks.
answer
Answer: D
question
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a: a. dedicated circuit b. dialed circuit c. ISDN circuit d. VPN circuit e. T-1 carrier circuit
answer
Answer: B
question
Which of the following is not a problem with dialed circuits? a. Data transmission rates on dialed circuits are relatively low. b. Dialed circuits may vary in quality. c. Transmission rates for dialed circuits can vary with each call. d. It is hard to predict if a given connection will be clear or noisy. e. Use of these circuits is very simple.
answer
Answer: E
question
Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.
answer
Answer: A
question
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design
answer
Answer: D
question
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design
answer
Answer: A
question
Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network
answer
Answer: D
question
Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh
answer
Answer: C
question
Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded
answer
Answer: B
question
A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit
answer
Answer: C
question
A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
answer
Answer: B
question
A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network
answer
Answer: A
question
With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds
answer
Answer: C
question
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network
answer
Answer: B
question
Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user
answer
Answer: A
question
Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location
answer
Answer: D
question
_________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence
answer
Answer: D
question
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking
answer
Answer: B
question
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. dial-up access through a modem b. intranet c. extranet d. WAN e. none of the above
answer
Answer: A
question
At the top of the Internet structure are national ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines
answer
Answer: B
question
National ISPs connect together and exchange data at ___________. a. Network Access Points b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center
answer
Answer: A
question
_________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence
answer
Answer: D
question
__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling
answer
Answer: B
question
In general, local ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs
answer
Answer: A
question
The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society
answer
Answer: E
question
Digital Subscriber Line: a. is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop b. combines analog transmission and frequency division multiplexing c. involves the use of a customer premises equipment (CPE) d. uses a combination of amplitude and phase modulation e. all of the above
answer
Answer: E
question
The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3
answer
Answer: D
question
A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet
answer
Answer: D
question
Internet 2 is also known as: a. CA*Net3 b. IETF c. Next Generation Internet d. the Abilene network e. passive optical networking
answer
Answer: D
question
Which of the following groups developed Internet 2? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. ISOC
answer
Answer: C
question
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit
answer
Answer: A
question
Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning
answer
Answer: A
question
CA*Net3 was developed by a Canadian organization known as: a. IETF b. ARDNOC c. ADSL d. RFC e. UCAID
answer
Answer: B
question
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster
answer
Answer: C
question
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications
answer
Answer: D
question
An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster
answer
Answer: D
question
A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion
answer
Answer: A
question
Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster
answer
Answer: A
question
A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster
answer
Answer: B
question
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster
answer
Answer: D
question
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan
answer
Answer: A
question
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design
answer
Answer: C
question
Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization
answer
Answer: D
question
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.
answer
Answer: C
question
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT proxy server c. IP spoofing bridge d. packet level firewall e. smart hub
answer
Answer: B
question
To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES
answer
Answer: A
question
Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. UCAID
answer
Answer: E
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New