Networking Chapter 8, exam
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.
Answer: False
The Simple Mail Transfer Protocol is the least commonly used e-mail standard.
Answer: False
The World Wide Web was conceived at University of Utah as part of the development of the Internet.
Answer: False
The application architecture called the distributed computing model uses the "thick" client approach.
Answer: False
The earliest data communications networks were client-server networks.
Answer: False
The two-tier e-mail architecture does not require any application software on the client computer.
Answer: False
To use the Web, each client computer requires a data link layer software package called a Web browser.
Answer: False
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.
Answer: False
A network computer is designed primarily to communicate using Internet based standards, but has no hard disk. It has only limited functionality.
Answer: True
In a client-server network, the presentation logic is the responsibility of the client computer.
Answer: True
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
Answer: True
Middleware is the software that sits between the application software on the client and the application software on the server.
Answer: True
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.
Answer: True
A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands. (True or False)
False
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network. (True or False)
False
Host-based and client-based networks are similar in that the client computer performs most of the work. (True or False)
False
The Simple Mail Transfer Protocol is the least commonly used e-mail standard. (True or False)
False
The World Wide Web was conceived at University of Utah as part of the development of the Internet. (True or False)
False
The World Wide Web was conceived at University of Utah as part of the development of the Internet. (True or False)
False
The application architecture called the distributed computing model uses the "thick" client approach (True or False)
False
The standard protocol for communication between a Web browser and a Web server is the web protocol. (True or False)
False
The two-tier e-mail architecture does not require any application software on the client computer. (True or False)
False
To use the Web, each client computer requires a data link layer software package called a Web browser.
False
To use the Web, each client computer requires a data link layer software package called a Web browser. (True or False)
False
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. (True or False)
False
baseline
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. (True or False)
True
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. (True or False)
True
The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. (True or False)
True
The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data. (True or False)
True
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. (True or False)
True
Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture.
True
To get a page from the Web, a user must type in a URL, which stands for:
Uniform Resource Locator
The standards H.320, H.323, and MPEG-2 are commonly used with
Videoconferencing
The ________________ cloud deployment model provides the highest levels of control, privacy and security.
private
Host-based and client-based networks are similar in that the client computer performs most of the work.
Answer: False
________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet
10/100 Ethernet
IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz
2.4GHz and 5GHz
How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8
3
The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
54 Mbps
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.
Answer: False
building-block
Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
54 Mbps
How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2
8
802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5
802.11b
The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g
802.11n
Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15
802.11n
Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g
802.3
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software
Answer: B
As the demand for more and more network applications grow; host-based computing becomes the best solution.
Answer: False
turnpike effect
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.
The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Access layer
80
According to one rule of thumb, ______ percent of circuit loading information is easy to gather.
Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.
All of the above are true statements.
An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
Answer: A
In the three tier architecture the software on the client computer is responsible for____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage
Answer: A
There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header
Answer: A
To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package
Answer: A
_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
Answer: A
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n
Answer: B
An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
Answer: B
Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla
Answer: B
One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
Answer: B
The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher
Answer: B
With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic. a. Application; presentation b. Presentation; data access c. Data access; presentation d. Application; data access e. Presentation; application storage
Answer: B
A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
Answer: C
Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures
Answer: C
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above
Answer: C
How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server
Answer: C
In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer
Answer: C
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. user agent d. Webcast package e. gateway agent
Answer: C
The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language
Answer: C
With respect to costs for a client-server network, which of the following is true? a. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power. b. More network capacity, which costs more money, is required for client-server networks than for client-based networks. c. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper. d. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client. e. None of the above
Answer: C
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
Answer: C
A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
Answer: D
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture
Answer: D
One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered
Answer: D
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library
Answer: D
With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic
Answer: D
________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
Answer: D
IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
Answer: E
There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body
Answer: E
Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
Answer: E
A "thin client" approach places most of the application logic on the client.
Answer: False
A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.
Answer: False
All three parts (request line, request header, request body) of an HTTP request from a web browser to a web server are required when a request is made.
Answer: False
The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.
Answer: True
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
Answer: True
____________ is not an important middleware standard.
Asynchronous Transfer Mode (ATM)
CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance
Carrier Sense Multiple Access with Collision Avoidance
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________
The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Core layer
Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva
DEC, Xerox, and Intel
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services
Directory Services
The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Distribution layer
much more
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.
capacity planning
Estimating the size and type of the "standard" and "advanced" network circuits is called _________.
With respect to costs for a client-server network, which of the following is true?
Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
A "thin client" approach places most of the application logic on the client. (True or False)
False
Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system
PAD
__________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables
Hubs provide a complicated way to connect network cables
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________.
Hypertext Transfer Protocol
WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a
IEEE 802.11ad
VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics
IEEE 802.1q standard
With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.
IaaS
needs analysis
In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.
technology design
In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.
the goal is to understand what users and applications the network will support
In needs analysis:
the decisions for fundamental technology/protocols and circuit capacity are interrelated
In the technology design stage of network design,
Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.
It is not a hybrid type of Ethernet.
Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting
It is used in token ring protocol LANs
Which of the following is not an advantage of instant messaging?
It usually takes days for an IM message to be delivered to the recipient.
LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor
LAN server and network circuit
___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control
Logical topology
In a host-based system with a mainframe, upgrades to the host are _____________.
Lumpy
With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP
MAC address filtering
The software that runs on the mail server is referred to as the ____________
Mail transfer agent
Which of the following is not an example of a mail user agent software package?
Microsoft Word
Marc Andreessen led a team that developed the first graphical Web browser, which was called:
Mosaic
In a ___________ architecture, computers are both client and server, thus sharing the work.
Network
_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System
Network Operating System
One of the most frequently used Telnet applications is
PuTTY
Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access
QoS
Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE
RAID
Request for Proposal
RFP stands for:
A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
Routed backbone
_________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones
Routed backbones
_________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet
Securenet
____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy
Server virtualization
The most commonly used e-mail standard is:
Simple Mail Transfer Protocol
A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone
Switched backbone
_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones
Switched backbones
Which of the following is not true about Telnet?
Telnet poses no security threat.
narrow and deep
The building block design approach is sometimes called
logical network design
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.
after the vendor(s) are selected
The large network purchases are done:
building backbone
The network architecture component that is sometimes referred to as the distribution layer is the
LAN
The network architecture component which enables users to access the network is the
Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.
The physical topology is the same as the physical topology of shared Ethernet: a ring.
Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.
The switch has a physical bus topology.
rapidly growing
The traditional network design approach does not work well for _________ networks.
discover
There are some network modeling tools that can ________ the existing network.
Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.
They can only switch messages based on their data link layer addresses.
Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.
They tend to use lower speed circuits than LANs.
The idea for a special hypertext network, called the World Wide Web, was conceived of by:
Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
issue an RFP to vendors
To estimate costs for large network purchases, organizations often:
A server farm is a group of computers that are linked together so they act as a one computer. (True or False)
True
Cloud-hosted virtual desktops are now available through a service called DaaS allowing users to access the same client computer (virtual desktop) from any computer and any location. (True or False)
True
In a client-server network, the presentation logic is the responsibility of the client computer. (True or False)
True
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
True
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage. (True or False)
True
Middleware is the software that sits between the application software on the client and the application software on the server. (True or False)
True
A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
Virtual LAN
Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone
Virtual LAN
A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest
WI-LO network
To interact with the World Wide Web, a client computer needs an application layer software package called a:
Web browser
cost of advertising brochures for new products to be offered by an organization
Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?
focus on the growth in network use
Which of the following is a way to sell the network proposal to management?
non-necessary requirements
Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized?
specifications for a particular lighting fixture in the network operating center
Which of the following is not an example of a building block used in technology design?
an application will have drop down menu choices
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?
specific routers that have been chosen to implement the proposed network
Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams?
In designing LAN networks, network designers tend to err on the side of building too small a network
Which of the following is not true about network design?
Ethernet
Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?
Peak circuit traffic
__________ is an estimate of the highest data volume on a link.
Most WiMAX providers in the US are using an effective data range of Select one: a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles
a. 0.5 to 1.5 miles
Some of the new applications being developed for a high-speed Internet include Select one: a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning
a. Tele-immersion
Which of the following is not true about switched Ethernet? Select one: a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. Most switches support full duplex circuits. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.
a. The switch has a physical bus topology.
Which of the following is true regarding switched backbones? Select one: a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based
a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment
In general, tier 3 ISPs make money by charging ________. Select one: a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs
a. customers
Dynamic routing: Select one: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. does not add to the network traffic and should be used in all network environments d. is another term for static routing in WANs
a. imposes an overhead cost by increasing network traffic
A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. Select one: a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point
a. line splitter
In a ring design WAN, Select one: a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver
a. messages can take a long time to travel from the sender to the receiver
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. Select one: a. much more b. much less c. about the same d. exactly the same e. a little more
a. much more
Which of the following is not a purpose for using hubs in a network? Select one: a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above
a. to act as a communications server
Which of the following is not a way in which network requirements, identified in the needs analysis of the building-block network design process, are organized? Select one: a. unnecessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate ANSWER
a. unnecessary requirements
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
access point
Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines
add hidden nodes
Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network
adding new keyboards to the client computers
With a client-based network, one fundamental problem is that:
all data on the server must travel to the client for processing
10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct
all of the answers are correct
Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server's CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance
all of the answers are potential bottlenecks for LAN performance
Which of the following is not a general function by any application program?
application access storage
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.
application architecture
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.
application logic
How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above
assigning each access point a different channel to communicate with clients
One disadvantage of the ____________ architecture is that places a greater load on the network.
n-tier
Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? Select one: a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps
b. Ethernet
At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. Select one: a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines
b. Internet service providers
___________ is how the network works conceptually. Select one: a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control
b. Logical topology
__________ has led to the belief that the Internet is "free". Select one: a. Encrypting b. Peering c. Bridging d. Tolling e. Polling
b. Peering
The network architecture component that is sometimes referred to as the distribution layer is the Select one: a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
b. building backbone
A star topology is: Select one: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails
b. dependent upon the capacity of the central computer for its performance
SONET: Select one: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is almost identical to the ITU-T standard, synchronous digital hierarchy (SDH) c. uses existing copper cabling and the PSTN network d. refers to Sprint Overall Network e. is not currently available, even in large cities
b. is almost identical to the ITU-T standard, synchronous digital hierarchy (SDH)
Which of the following is not a key deliverable for the cost assessment step of the building-block network design process? Select one: a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice
b. list of wish list requirements
Associated with a switched backbone, MDF is an acronym for: Select one: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility
b. main distribution facility
Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. Select one: a. multipoint b. point-to-point c. shared d. ring e. star
b. point-to-point
Mesh networks: Select one: a. usually provide relatively long routes through the network (compared to ring networks) b. typically contain more circuits in the network than in star or ring networks c. do not use decentralized routing d. typically are less expensive than ring networks e. do not have many possible routes through the network to prevent one circuit from becoming overloaded
b. typically contain more circuits in the network than in star or ring networks
The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected
bus
WiMAX was designed to use the _______ frequencies. Select one: a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz
c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ
The data rate for a T-3 circuit in North America is: Select one: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps
c. 44.376 Mbps
__________ is an estimate of the highest data volume on a link. Select one: a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer
c. Peak circuit traffic
Which of the following would be least effective in improving backbone performance? Select one: a. upgrading memory for devices in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between devices e. improving devices in the network
c. adding new keyboards to the client computers
Which of the following is not a basic architecture for dedicated circuit networks? Select one: a. ring b. partial mesh c. bus d. star e. full mesh
c. bus
A star architecture: Select one: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above
c. connects all computers to one central computer that
The network architecture component which contains the organization's servers is called the Select one: a. LAN b. building backbone c. data center d. enterprise edge e. WAN
c. data center
A _______ is a connectionless method of sending data packets on a packet switched service. Select one: a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit
c. datagram
Which of the following is not a technology layer that is considered when designing backbone networks? Select one: a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options
c. decentralized layer
A ____________ allows many users to share the same set of files on a common, shared disk drive. Select one: a. print server b. database server c. file server d. piconet server e. remote access server
c. file server
A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a ___________. Select one: a. ADS b. domain c. forest d. tree e. NDS
c. forest
1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX
can run at either full- or half-duplex
Client-server architectures:
can use middleware to provide a standard way of communicating between software from more than one vendor
Which of the following would not be part of an "ideal" backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN
coax cabling throughout LANs and BN
A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server
collision server
The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer.
community
What technique is used by most videoconferencing applications to reduce the amount of data being transmitted?
compression
Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider
controlling access to a media by more than one computer in a LAN
The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size
cost and management complexity
______________ are sometimes called private line services. Select one: a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks
d. Dedicated-circuit networks
Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. Select one: a. backbone b. switched c. routed d. QoS e. access
d. QoS
Which of the following is one of the tier 1 ISPs in North America? Select one: a. IETF b. IEEE c. IAB d. Sprint e. ISOC
d. Sprint
A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Select one: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone
d. Switched backbone
Which of the following is not an effective way to reduce LAN network demand: Select one: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes
d. add hidden nodes
A digital service offered by cable companies is the _________. Select one: a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet
d. cable modem
A___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. Select one: a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system
d. cable modem termination system
Media access control refers to: Select one: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider
d. controlling access to a media by more than one computer in a LAN
Device performance on a backbone network will not be improved by: Select one: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options
d. translating packets from one protocol to another as they enter the BN
With the two-tier client-server architecture, the server is responsible for the ________ logic.
data access
An application program function is __________, or the processing required to access data.
data access logic
The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer
data center
_________ is an application program function that deals with storing and retrieving data.
data storage
Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options
decentralized layer
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical
directional
A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint
domain
Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used
dumb terminals
The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed
during the construction of the building
The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck
e-commerce edge
Another term for a mail user agent is:
e-mail client
A subnetted or hierarchical backbone can also be called: Select one: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
e. Routed backbone
_________ is not a type of Ethernet specification. Select one: a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet
e. Securenet
Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks? Select one: a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware
e. The most expensive part of any network is the hardware
Which of the following is not true about Layer-3 switches? Select one: a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.
e. They can only switch messages based on their data link layer addresses.
Which of the following is false about staff costs for a network? Select one: a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities
e. When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities
100Base-T: Select one: a. supports 100 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct
e. all of the answers are correct
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. Select one: a. building block b. access layer c. core layer d. cost assessment e. logical network design
e. logical network design
With a switched backbone network, the equipment is usually placed in a ______. Select one: a. server b. NIC c. cabinet d. basement e. rack
e. rack
Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia
encouraging the use of applications such as medical imaging
When a variety of devices are used in a network, it takes less time to perform network management activities
false about staff costs for a network?
Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair
fiber
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server
file server
A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS
forest
A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion
forwarding table
Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching
fragment-free switching
Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server
going from 100Base-T Ethernet to 10Base-T Ethernet
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem
hidden node problem
An N-tiered architecture:
is generally more "scalable" than a three-tiered architecture
Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media
it has a very low capacity
Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches
learn addresses by reading the source and destination addresses
Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak
legacy
The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer
load balancer
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
mail user agent
Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility
main distribution facility
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.
mainframe
Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer
may also be called TCP/IP gateways
In a client-server network, _________ gets software from different vendors to work together.
middleware
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list
network profile
An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.
not a step under the traditional network design approach?
implementation
not a step used in newer types of network design processes?
Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors
not contributing to the dramatic increase in network traffic today?
The most expensive part of any network is the hardware
not making the traditional design approach less appropriate for today's networks?
__________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical
omnidirectional
Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks
overlay networks
Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches
patch cables
IMAP (Internet Message Access Protocol):
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode
physical carrier sense method
Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer
physical port on the switch
A "thick client" architecture approach:
places all or almost all of the application logic on the client
A "thin client" architecture approach:
places all or almost all of the application logic on the server
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
point-to-point
With the two-tier client-server architecture, the client is responsible for the ________ logic.
presentation
In the three tier architecture, the software on the client computer is responsible for the ____________.
presentation logic
________ is the presentation of information to the user and the acceptance of the user's commands.
presentation logic
The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system
provide the software that performs the functions associated with the physical layer
10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network
provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack
rack
Circuit loading
refers to the amount of data transmitted on a circuit.
If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable
replacing the cable with fiber optic cable
There are optional and required parts of an HTTP request. They are:
request line, request header, request body
Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don't need much time to establish separate subnet addresses for each LAN
require more management than switches
There are required and optional parts of an HTTP response. They are:
response status, response header, response body
A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone
routed backbone
Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above
to act as a communications server
Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet
routers can connect two or more networks that use the same data link protocol
Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)
security (relative to fiber)
Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation
segmentation
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.
server
A ________ is a group of computers linked together so that they appear to act as one computer.
server farm
A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN
storage area network
Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11
sufficient memory
How are the application architecture functions split up in a client-server network?
the presentation logic is on the client, while the data storage and data access logic are on the server
A response status code of 404 means:
the requested page was not found
Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect.
the security of the WLAN
One underlying problem with a host-based network is that:
the server can get overloaded since it must process all messages
Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable
there are many more networking devices in a switched backbone network
Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options
translating packets from one protocol to another as they enter the BN
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.
two
To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server
upgrade to a bigger circuit
Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices
use a star topology with one device, usually a switch
Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously
usually enables all attached circuits to send or receive packets simultaneously
Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer
usually incorporate repeaters or amplifiers
_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying
warchalking
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.
web server
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.
webcasting
A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
wireless NIC