C724:_Unit_5-8_Q&A

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the difference between a LAN and a WAN?

A LAN connects computer systems locally, whereas a WAN connects systems over a long distance.

The term 'generations' is used to describe changes in which type of technology?

Cellular wireless standards

When streaming data or voice, which type of switched network is used?

Circuit switch

In asynchronous communications, two people in separate locations can communicate with each other during different times of the day. Which is an example of asynchronous communication:

Collaboration among participants via online message boards

What is a benefit of telecom services convergence for business?

Combining data, voice, and video into one platform means having only one network to service and maintain.

What is meant by a 'Core' router?

Core routers 'collapse' the network into a backbone for high bandwidth communication.

Which of the following is not a telecommunications network protocol?

DOS

What is the best description of how a packet switched network works?

Data is digitized, enclosed in packets, and transmitted.

What is another name for a network host?

Data terminal equipment

Which of the following is a disadvantage of using a VPN?

Expensive

[True/False] 4G networks, also called Long-Term Evolution (LTE), offer data transmission speeds of 64 kbps in the Ultra High Frequency band.

False

The Network address translation (NAT) technology allows private users to ________________________.

redefine network addresses to assign their own addresses

[True/False] An information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.

False

[True/False] Coaxial cable is the required medium for telecommunication transmissions.

False

[True/False] Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP addresses into the URL. All domain names must have four parts, regardless of where the websites are located. Each part is written as a set of octets and is separated by a period.

False

[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone.

False

[True/False] When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols.

False

[True/False] With security measures already implemented in the network systems, it is not necessary for telecommuters to use a secured connection, such as the Virtual Private Network (VPN), to gain remote access to their work servers.

False

[True/False] The Open System Interconnection model consists of five layers.

False - 7 Layers

The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture?

The client has control over the applications residing on the server. (the server, not the client, has control over the applications residing on the server)

A reliable intranet connection provides organizations and their suppliers and vendors with ________________________________.

a secure platform for internal use

To facilitate efficient and effective business, corporations utilize the _____________________ for communications with suppliers and vendors.

extranet

Internet Protocol version 4 (IPv4) was created and standardized in the 1970s by the original ARPANET group to _________________________________.

facilitate communications

The advent of the Internet has revolutionized our lives, becoming a vast resource for information, utility, and productivity. Which statement below about the Internet is FALSE?

(False:) Once you upload your data to the Internet, it will be available to the public.

How many layers are in the standard OSI model?

7- physical, data, network, transport, session, presentation, application

What is the typical broadband data speed of a 4G network?

100,000 kbps

What is the primary difference between a 1G cellular network and the current 4G network?

1G enabled mobile voice telecommunication while 4G offers voice, data and video.

Which of the following best describes the first generation of mobile networks?

1G networks were "voice only" analog communication networks.

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?

25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP

Organizations can exchange data and files through cloud computing or a VPN. Which of the following is an advantage of a VPN, but not an advantage of cloud computing?

A VPN provides more secure access than cloud computing.

What is the difference between a hertz and a byte?

A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency.

What is a denial of service attack?

A hacker attempt to tie up network host resources making them unavailable.

What is the function of a network bridge?

A network bridge links two network LANs together.

What is a network management application?

A network management application retrieves and analyzes network traffic data.

What is a radio frequency survey?

A radio frequency survey is a signal strength detection process to identify the best wireless access point locations.

Which of the following best describes a telecommunications network?

A system of nodes and links

Which of the following statements is FALSE?

An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring.

For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet?

Banking transactions - must be encrypted to be safely communicated over the internet

How do small businesses and large enterprises protect themselves from network intrusions?

Both small and large enterprises use firewalls to prevent intrusion.

Why is it imperative that modern businesses have a social media marketing strategy?

Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care.

[True/False] Spoofing a network is a false representation of digital identity and leads to less packet encapsulation information as the network responds.

False - When a network is spoofed, it sends useful data back to the source to enable it to connect. This information can help a hacker penetrate the network.

[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals.

False - it uses RADIO waves over the RADIO spectrum

Which of the following is not a circuit switching protocol?

IP

Which of the following application provided by the Internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee?

Information repositories

Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following IS a benefit of an extranet?

Interact with suppliers - often via an SCM

What is the Internet of Things (IoT)?

Internet of Things means connectivity of all devices to enable service automation.

The converged communications structure is based on what?

Internet, audio communications, and the PSTN

In the near future, most devices, such as home appliances, automobiles, and consumer product packages, will be connected to the Internet. What is this field of networking called?

IoT

Which of the following statement about the IP version 4 (IPv4) addressing scheme is true?

It has 4 bytes, which is equivalent to 32 bits.

What is a key trend in mobile communications that businesses must be aware of?

Mobile access to the Internet is growing exponentially.

What are three reasons that more businesses are deploying wireless networks?

Mobility, cost, and scalability

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?

More complexity due to the need for more systems and better improvements in their processing capabilities.

Are hypervisors or hypervisor applications necessary in small businesses with simple networks?

No, a hypervisor is a computer software that enables network virtualization and is not necessary.

What does OSI stand for?

Open System Interconnection

Which of the following is not a wireless telecommunication networking protocol?

POP

What is the public switch telephone network (PSTN)?

PSTN is the voice telephone network around the globe.

What does PSDN stand for?

Packet Switched Data Networks

What is a benefit of packet switching?

Packet switching does not need a dedicated network connection.

What are the two fundamental protocols that can describe modern telecom networks?

Packet transmission and TCP/IP protocol.

What is the advantage of RFID passive tags?

Passive tags leverage energy from radio signals.

What information can be gained by sniffing a wireless network?

Passwords and Login IDs

What are peer-to-peer network topologies?

Peer-to-peer topologies connect each user in a network directly.

Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered?

RFID

What is the role of repeaters in telecommunication networks?

Repeaters are used to amplify signals as they travel in a network.

Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day?

SMTP - (simple mail transfer protocol) the popular mail protocols include IMAP and POP3

What is meant by wireless networks being scalable?

Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure.

Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop?

Smartphone

What is the most prevalent hacker attack on wireless networks?

Sniffing

What are three risks to wireless networks?

Sniffing, spoofing, and probing

Why should businesses have a social media strategy?

Social media is an ubiquitous marketing channel.

The Internet standard defines how computers and devices route communications traffic from one network to another over the Internet. What is this Internet standard known as?

TCP/IP

_________________________ is a universal telecommunication network protocol that most operating systems can recognize.

TCP/IP

Which of the following is a characteristic of a legacy or old analog network?

They carried continuous electronic waveforms.

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?

To increase the number of unique IP addresses.

Packet switching refers to a computer network's ability to do what?

Transmit information in discrete, parsed data encapsulated in packets.

[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider.

True

[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions.

True

[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises.

True - Wireless LANs allow visitors (customers or suppliers) to access the internet and their information systems for collaboration and decision making.

A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs?

URL (uniform resource locator)

In asynchronous communication, participant communication is not concurrent. Why is this an advantage of email?

Users can send or reply to messages on their own schedule.

Which of the following is correct about virtual networks?

Virtual networks function through network virtualization.

Why is WPA critical to wireless networks?

WPA (Wi-Fi Protected Access) is a tunneling encryption protocol that secures wireless data transmissions.

___________________________ are located in strategic locations and used to monitor physical or environmental conditions.

WSNs

Which of the following best describes wireless sensor networks (WSNs)?

WSNs are spatially distributed sensors.

The Internet was initially developed using a telephone connection. Which of the following is an innovative application provided by the Internet?

Web enabled storefront

Which of the following application provided by the Internet allows an online retailer to conduct business?

Web enabled storefront

When would client computers using TCP/IP in a client/server network not be able to communicate with each other?

When a client computer is offline and not connected to the Internet

What does WSN stands for?

Wireless Sensor Networks

VoIP technology is currently a very popular form of communications because it ______________________________________.

delivers voice information in digital form using packet switching

A router connects data links from a single network and transmits data packets between ______________________________________.

different networks

Cloud computing is becoming more popular because users ___________________________________________.

have more flexibility than they do with VPN

To facilitate efficient and effective business, corporations utilize the ____________________ to communicate with their customers.

internet

To facilitate efficient and effective business, corporations utilize the ______________________ to manage employees' affairs.

intranet

Social networks must be targeted by businesses since social networking is a _________________ channel.

media

Internet access via ______________________________ devices is growing exponentially, surpassing Internet access by fixed, desktop computers.

mobile

Wireless LAN networks are _____________________________________________.

more scalable than wired networks.

Wireless LAN networks support the on-premise workforce, making them more mobile, which increases _______________________ and access to real-time information.

productivity

Wired networks may not be advantageous because of the large amount of cables involved, but they provide businesses with network reliability and _____________________________.

security

An important downside to a converged computer network is that when it goes down, _____________________________ is disabled.

telephone service

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity. This resulted in more complexity due to _________________________________________________.

the need for more systems and better processing capabilities


Conjuntos de estudio relacionados

Chapter 20: Drug Therapy With Tetracyclines, Sulfonamides, and Urinary Antiseptics

View Set

Unit 1 Multiple Choice Questions

View Set

m101b Receptors & Synaptic Transmission

View Set

AP World History Chapter 15 Vocab

View Set

Make Connections: The Plasma Membrane and Phospholipid Structure

View Set

Economics- Chapter 17 Practice Test

View Set

Les questions pour discuter en groupe

View Set