634 multi final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an application layer standard?

HTTP, POP, IMAP, HTML

Which of the following is true with respect to the data link layer?

It is responsible for getting a message from one computer to another (one node to another) without errors.

Which of the following is not true about CSMA/CD?

It is used in token ring protocol LANs

Which of the following is not a key advantage of digital transmission?

It permits only low transmission rates.

Which of the following is true about roll call polling?

It typically involves some waiting because the server has to wait for

Which of the following is true about roll call polling?

It typically involves some waiting because the server has to wait for a response from the polled client or terminal.

Which of the following is not true about formal standards?

They are always developed before de facto standards.

An N-tiered architecture:

is generally more "scalable" than a three-tiered architecture

Media access control:

is not very important in point-to-point with full duplex configuration

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?

transport Layer

Pervasive networking means that:

virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates

The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:

wavelength division multiplexer

The familiar background static on radios and telephones is called:

white noise

In general, controlled approaches:

work better than contention approaches for large networks that have high usage

With QoS routing different __________ are defined, each with different priorities.

classes of service

Which of the following is not a basic LAN component?

client, server., network interface card, network operating system

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.

cloud-based mesh design

Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.

codec

A virtual circuit is established in the ___________ routing method.

connection-oriented

Which of the following is not a property of a WAN:

connects a group of computers in a small geographic area such as room, floor, building or campus.

With __________ ARQ, the sender immediately sends the next message or packet of data.

continuous

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?

controlled chaos

Media access control refers to:

controlling access to a media by more than one computer in a LAN

The integration of voice, video, and data communications is also known as __________.

convergence

In general, local ISPs make money by charging ________.

customers

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

d. 255.255.0.0

A _______ is a connectionless method of sending data packets on a packet switched service.

datagram

A star topology is:

dependent upon the capacity of the central computer for its performance

An example of _____ of data would be if a computer virus eliminated files on that computer.

destruction

Which of the following is not an important future trend in communication and networking?

development of online batch systems

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

dial-up access through a modem

When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:

dialed circuit

Transmission speeds:

differ widely among media

A tornado that eliminates a network control center would be an example of a natural __________

disaster

A network switch failure is an example of a(n) ________ threat.

disruptive

Which of the following media has the lowest error rates and the highest transmission speeds?

fiber optic cable

Which of the following media is least susceptible to noise?

fiber optic cable

Which of the following type of media is least susceptible to eavesdropping?

fiber optics

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.

full mesh design

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.

giga, gigabit

The two basic types of media are:

guided and wireless (radiated)

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.

half-duplex

A client computer is assigned a data link layer address is by:

hardware manufacturers

The newer form of IP, version 6 (Ipv6) is:

has an increased address size from 32 bits to 128 bits

Which of the following is a primary advantage of a VPN?

low cost

Routers:

may also be called TCP/IP gateways

Which of the following would be considered a type of wireless media?

microwave

Which of the following is not a way to reduce network demand?

moving data further from the applications and people who use them

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.

multiplexer

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.

network profile

Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?

newer version permits jumbo frames

Switched Ethernet:

operates at about 95% of capacity before performance becomes a problem.

Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star

point-to-point

The server version of the Network Operating System does not:

provide the software that performs the functions associated with the physical layer

Which is not a function of the physical layer:

providing error-free transmission of data.

The three stages of the formal standardization process are ______________________.

specification, identification of choices and acceptance.

Another term for impulse noise is:

spikes

The primary source of error in data communications is:

spikes

A typical TCP packet has a _______ header of control information.

192-bit

The older version of IP has a ________ header of control information.

192-bit

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.

star design

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.

stop and wait

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport Layer

With a virtual private network, users create permanent virtual circuits through the Internet called:

tunnels

Switched Ethernet:

usually enables all attached circuits to send or receive packets simultaneously

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

virtual private network

The source destination port identifier tells the destination station _____________.

which application layer process the packet is from.

A(n) _____________ is required to connect a computer to WLAN.

wireless NIC

____________ is not a function of a data link protocol.

Amplitude shift keying

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.

Common carriers

_____________ routing is a method of routing in which each packet makes its own way through the network.

Connectionless

______________ routing is most commonly used when the application data or message can fit into one single packet.

Connectionless

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?

Ethernet

Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?

Gateway

Which of the following devices is the most complex?

Gateway

______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.

Hamming code

Which of the following is a term used to group together the physical and data link layers?

Hardware layers

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

IP

__________can obliterate a group of bits, causing a burst error.

Impulse noise

_____________ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.

Information sharing

The closest the Internet has to an "owning" organization is the ___________.

Internet Society

At the top of the Internet structure are national ___________, such as AT&T and Sprint.

Internet service providers

Which of the following is not a critical software component in a dedicated server LAN?

LAN metering software

_______________ is a type of dynamic routing.

Link state

___________ is how the network works conceptually.

Logical topology

Marc Andreessen led a team that developed the first graphical Web browser, which was called:

Mosaic

The earliest type of fiber optic systems were:

Multimode

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

NAT proxy server

National ISPs connect together and exchange data at ___________.

Network Access Points

_____________ is the software that controls the network.

Network Operating System

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

Network address translation

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.

Peering

________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.

Polling

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic.

Presentation; data access

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.

TCP connection

what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.

TCP connection

_______ is the dominant network protocol today.

TCP/IP

Some of the new applications being developed for a high-speed Internet include

Tele-immersion

Which of the following is not a benefit of packet switched services?

The data transmission rates tend to be lower than dial-up or dedicated circuits.

Which of the following is not true about switched Ethernet?

The switch has a physical bus topology.

One drawback to dynamic routing is:

The transmission of status information "wastes" network capacity that could be used to send user messages

Which of the following is true regarding switched backbones?

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.

True

Which of the following groups developed Internet 2?

UCAID

Which of the following new Internet efforts was started by 34 universities?

UCAID

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

Which of the following is not a problem with dialed circuits?

Use of these circuits is very simple.

Which of the following is not an advantage of a WLAN?

WLANs allow users to work more securely than a wired LAN.

To interact with the World Wide Web, a client computer needs an application layer software package called a:

Web browser

A backbone network is:

a high speed central network that connects other networks in a distance spanning up to several miles.

A metropolitan area network is:

a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.

ARQ means that:

a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error

A phase hit is likely to be:

a short term shift out of phase

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

Which of the following is not a type of hardware device that can be used to interconnect networks?

'dumb' terminals

With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?

0001101 1

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.

1024

CA*Net3 was developed by a Canadian organization known as:

ARDNOC

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.

ARPANET

____________ is one of the most commonly used coding schemes used in data transmission.

ASCII

_________ is a specially formatted request used to perform IP address to data link address resolution.

Address Resolution Protocol

___________ is the process of determining the path that a message will travel from sending computer to receiving computer.

Addressing

Which of the following is not a controlled access method of media access control?

CSMA/CD

CSMA/CA is an acronym for:

Carrier Sense Multiple Access with Collision Avoidance

Ethernet LAN was developed by:

DEC, Xerox, and Intel

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.

DNS request packet

___________ is not a type of digital signaling technique.

Data rate signaling

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.

Directory Services

Server name resolution is done using the:

Domain Name Service

Which of the following can provide fault tolerance for the storage space on a server?

RAID

____________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.

Resource sharing

With which type of digital signaling does the signal always return to zero volts after each bit?

Return-to-zero signaling

A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection

SYN

___________ is the translation of application layer addresses into IP addresses.

Server name resolution

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.

Static routing

Which of the following is not a type of VPN?

T-1 VPN

Using parity, the probability for detecting an error, given that one has occurred, is:

about 50% for either even or odd parity

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.

access point

Which of the following is not an effective way to reduce LAN network demand:

add hidden nodes

With a client-based network, one fundamental problem is that:

all data on the server must travel to the client for processing

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

application layer address

Errors on a network can occur:

because of noise on the line

Which type of digital signaling would experience fewer errors because it has more distinct signals?

bipolar

Threat of intrusion comes from ____________.

both inside and outside of the organization

Which of the following is a function of the transport layer?

breaking long messages into several smaller messages

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet

broadcast message

The type of logical topology that Ethernet uses is a:

bus

The probability of detecting an error, given that one has occurred, using parity checking is about:

c. 50%

A digital service offered by cable companies is the _________.

cable modem

Dynamic addressing:

can solve many updating headaches for network managers who have large, growing, changing networks

Gateways:

can translate one network protocol into another

When a signal is reflected back to the transmitting equipment, it is called a(n) _________.

echo

Network demand will not be reduced by:

encouraging the use of applications such as medical imaging

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

To snare intruders, many organizations now use _________ techniques.

entrapment

Which of the following type of media is most commonly used in backbone networks because of its high capacity?

fiber

Which of the following media can best withstand harsh environmental conditions?

fiber optic cable

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.

intrusion

Often, incidents of ___________ involve employees of the organization, surprisingly enough.

intrusion

Digital Subscriber Line:

is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop combines analog transmission and frequency division multiplexing involves the use of a customer premises equipment (CPE) uses a combination of amplitude and phase modulation

Asynchronous transmission:

is also known as start-stop transmission

A peer-to-peer LAN:

is generally cheaper in hardware and software than a dedicated server

Synchronous transmission:

is used to transmit a "frame" or "packet" of data at a time

The _________ is the connection from a home or business to the telephone company end office.

local loop

Which of the following type of networks permit packets from separate messages to be interleaved?

packet switched network

The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.

packets

Devices in a rack are connected together using ___________.

patch cables

Networks that are designed to connect similar computers that share data and software with each other are called:

peer-to-peer networks

__________ has led to the belief that the Internet is "free".

peering

TCP/IP:

performs packetizing, as well as routing and addressing functions

IP:

performs routing functions

A _________ is a connection-oriented approach to sending packets on a packet switched service.

permanent virtual circuit

IMAP (Internet Message Access Protocol):

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

A logical bus topology:

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

With a switched backbone network, the equipment is usually placed in a ______.

rack

Mesh networks:

require more processing by each computer in the network than in star or ring networks

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

Which of the following is not a way that a router differs from a switch?

routers can connect two or more networks that use the same data link protocol

__________ is not an important function of the transport layer.

routing

An advantage of centralized routing is:

routing decisions are simple

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

routing table

Breaking a network into smaller parts is called network:

segmentation

TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

sequence numbers

A(n) ________ refers to a group of computers that are logically grouped together by IP number.

subnet

_____________ is not a form of modulation used to transform digital data into analog signals.

synchronous time division

Internet 2 is also known as:

the Abilene network

Which of the following is not true about switched backbones?

there are many more networking devices in a switched backbone network

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

threat

In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.

transport

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

transport

_____________ is an effective way to prevent attenuation.

Adding repeaters or amplifiers to a circuit

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?

Answer: A

With respect to costs for a client-server network, which of the following is true?

Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.

Shielding wires

__________ ensure that hardware and software produced by different vendors work together.

Standards

Which of the following is not true about de facto standards?

They never evolve into formal standards.

The idea for a special hypertext network, called the World Wide Web, was conceived of by:

Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.

True

In which layer of the Internet model would the HTTP standard be used?

application

The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:

attenuation

Client-server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

Which of the following is way to reduce or eliminate crosstalk on a circuit,

changing multiplexing techniques

_________ is the basic physical layout of the circuit.

circuit configuration

Inverse multiplexing means:

combining several low speed circuits to enable them to be transmitted across one high speed circuit

With contention:

computers wait until the circuit is free before they send data

The representation of the character A by the group of 8 bits, 01000001, is an example of:

digital coding

When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________.

harmonic distortion

To get more "bandwidth" in a digital transmission, you must:

increase the range of frequencies available for a transmission

If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of:

intermodulation noise

Of the following, which is not true about fiber optic cable?

it has a very low capacity

____________ refers to the transmission characteristics of the circuit.

logical circuit

__________ is a line-of-sight type of wireless media.

microwave

In a client-server network, _________ gets software from different vendors to work together.

middleware

Cross-talk:

occurs when one circuit picks up signals in another

Frequency division multiplexing:

operates by dividing the signal into different frequencies

The direction in which the sound wave begins is known as:

phase

The height of a sound wave is called its:

phase

The ____________ layer of the OSI model is responsible for data format translation.

presentation

In the three tier architecture the software on the client computer is responsible for____________.

presentation logic

On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.

repeaters

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.

session, presentation and application

Which of the following is not a function of the data link layer?

specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

As part of the five-layer network model used in this textbook, the data link layer sits directly between:

the physical and the network layers

How are the application architecture functions split up in a client-server network?

the presentation logic is on the client, while the data storage and data access logic are on the server

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

The fourth layer of the OSI model is called the __________ layer.

transport


Conjuntos de estudio relacionados

Plagiarism Tutorial Activity - UTA

View Set

immunodeficiency and vasculitis level one

View Set

Algebra 1 1st Semester Mid-term Review

View Set

Simulation NBDHE Exam by Darby (Exam #4)

View Set

Muscles in the arm: origin, insertion and action

View Set