Networking Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match the item on the left with the reason that it is false on the right. 1. The six computers in this building are connected via a WAN with servers. 2. All the computers in this building are servers that we use to check our e-mail as part of a WAN. 3. Our LANs are connected together into a WAN via a server in a cloud.

1. A WAN connects multiple LANs. 2. Servers support other computers, often in a WAN, but they are not directly used by people 3. A WAN connects LANs through a known network.

workstation

a computer that can be used as a client on a network

process

to change data by following rules

Match each item to the type of network or network component it represents. 1. A plastics factory's on-site network 2. A network consisting of five plastics factories owned by the same company 3. A tablet used by a plastics factory's representative to check his work e-mail

1. LAN 2. WAN 3. client

Match the vocabulary to the correct definition. 1. a set of supporting protocols in a series of layers 2. a unique number identifying a device such as a switch, router, hub, or NIC 3. a protocol stack used to regulate communication between devices on the Internet and other networks 4. used at the TCP/IP application layer to organize Web pages 5. used at the TCP/IP application layer to download files

1. protocol stack 4. HTTP 3. TCP/IP 5. FTP 2. MAC address

Match the protocol to the layer it represents. 1. Internet 2. Network access 3. Transport

2. ARP 1. ICMP 3. UDP

Match the vocabulary to the correct definition. 1. a technique for blocking packets with suspicious IP addresses in their headers 2. the process of retrieving encapsulated data by removing all the "handling instructions" that have been added 3. the process of preparing data to move through a network by adding "handling instructions" for each layer to follow 4. special handling instructions added to the end of an encapsulated data unit 5. special handling instructions added to the front of an encapsulated data unit 6. a technique for changing an IP address in a packet header to the address of a trusted source 7. a sender on a list of senders approved for access to a node or a file on a node

2. decapsulation 4. footer 6. spoofing 3. encapsulation 7. trusted source 1. antispoofing 5. header

Which of the following is not an accurate comparison of mesh networks and ring networks? A full mesh network is excellent but extremely expensive compared with a ring network. A mesh network connects all nodes to each other, while a ring network connects each node to the one nearest to it. A ring network can be wider than most topologies but not as wide as a mesh network. A mesh network is less stable than a ring network; that is why full mesh networks are rare.

A mesh network is less stable than a ring network; that is why full mesh networks are rare.

Which statement best compares routers and hubs? Hubs are the gateways of LANs, assisted by routers. A router is a gateway to a network, whereas a hub is a connection between nodes. Both send data, but a hub is better for large networks. A hub is a gateway to a network, whereas a router directs packets.

A router is a gateway to a network, whereas a hub is a connection between nodes.

Differentiate between trusted-source-security and antispoofing-security techniques. Trusted-source security is more reliable in most situations. Antispoofing security also decapsulates, while trusted source security does not. Antispoofing security checks whether the sender is in-network; trusted-source security does not. Trusted-source security checks IP addresses, while antispoofing security does not.

Antispoofing security checks whether the sender is in-network; trusted-source security does not.

Why is the OSI reference model useful? Because the OSI creates standards that network engineers need. Because it means all network equipment is built to the same standard. Because it can be applied to a network to solve anything that goes wrong. Because it provides troubleshooters a shared frame of reference.

Because it provides troubleshooters a shared frame of reference.

Why is it worth remembering "All people seem to need data processing"? Because data processing is the real reason for a network engineer. Because that will help you remember the OSI reference model. Because that is an ISO standard for network engineers to know. Because that is a mnemonic for the ISO model.

Because that will help you remember the OSI reference model.

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Both application layers are relevant mainly to programmers, not to network technicians.

Which statement below accurately compares ring networks and star networks? Because of their configuration, star networks can be bigger than ring networks. In a star network topology, when one node goes down, the whole network goes down, whereas a ring network would not go down. Each node in a ring network makes a fresh copy of the packet when it comes through, so ring networks can be bigger than star networks or other topologies. Ring networks have less redundancy than star networks, so they are more efficient.

Each node in a ring network makes a fresh copy of the packet when it comes through, so ring networks can be bigger than star networks or other topologies.

Jenny's boss says that he already has security that accepts messages only from trusted sources, so he does not need more security. Is he right? Why or why not? Yes, because he has the best security there is. Yes, because trusted source is sufficient to keep out all known tactics. No, because attackers always think up new ways to get into a system. No, because spoofing fools trusted-source security.

No, because spoofing fools trusted-source security.

Why are packets important in a network? Packets are how the data in a network know where to go. Packets are where the data in a network are going. Packets are the bits of data that travel through a network. Packets are the addresses where the data are going.

Packets are the bits of data that travel through a network.

Sam says that when he clicks on his schedule on the Internet, his computer is a receiver, not a sender. Is Sam correct? Why or why not? Correct, because his computer is receiving Sam's schedule Correct, because his computer is mainly receiving, although it does send an initial request so that Sam can get his schedule Wrong, because his computer is sending a request for Sam's schedule Wrong, because his computer is sending and receiving requests so that Sam can get his schedule

Wrong, because his computer is sending and receiving requests so that Sam can get his schedule

Megan says she never needs to look at the transport layer when she is searching for what went wrong with the network she supports. Is Megan right or wrong, and why? Right, because the transport layer is software, and network engineers do not need to focus on software. Right, because the transport layer usually does not go wrong in a way that involves a network engineer. Wrong, because if data are coming through garbled, it is a transport layer problem. Wrong, because transporting information is what a network does, and the transport layer is at the heart of that layer.

Wrong, because if data are coming through garbled, it is a transport layer problem.

Jen's office contains the following devices: Jen's laptop, which is wirelessly connected to the server and turned on Her secretary's PC, which connects to the server is turned off A virus-infected computer that has been unplugged from the network The boss's smart phone, which wirelessly connects to the server You know that the office network is a _____. a LAN a WAN a cloud P2P

a LAN

Which of the following is a card in a computer that manages packets that arrive at or depart from the computer? a NIC a node a NAS a port

a NIC

hub

a device for connecting nodes in a network. Its limitations make it suitable only for peer-to-peer networks or very small LANs

mnemonic

a device for remembering something

Ethernet

a formal standard for constructing a LAN

environment

a general term whose precise meaning depends on what the architect had in mind when designing the network. If the intention was organizational, the meaning refers to how a network is configured.

LAN

a local area network, i.e., a network whose components are close enough to be connected without having to turn to an outside link

What is a layer, in the context of this lesson? the ethernet word for a packet a device for remembering something a logical unit of a system a computer's most basic program

a logical unit of a system

node

a machine with a network address

signal-to-noise ratio

a measure of the clarity of a message

star

a network topology in which each node is connected directly to a central hub

mesh

a network topology in which each node is directly connected to all other nodes

bus

a network topology whose nodes are connected to a main cable

cloud

a network whose details are uncertain and that can be accessed by other computers and networks

redundancy

a part of a network that repeats what another part does

Which of the following does NOT describe a node? the endpoint of a segment a machine with a network address a pointer for data a destination for packets

a pointer for data

Which of the following is not an interconnector? a mouse cable a printer cable a speaker cable a wireless keyboard jack

a printer cable

segment

a section of a network with a switch, hub, or router at each end

data center

a secure area where servers and other hardware operate apart from the client machine

A protocol stack is _____. the order of precedence in the transmission control protocol another way of saying "TCP/IP" a set of supporting protocols in a series of layers another way of saying "network address"

a set of supporting protocols in a series of layers

Which of the following most accurately describes a packet? a computer file a bundle of photons a sliver of data a coded message

a sliver of data

You need a reliable network for about twenty-five computers that will be distributed across a large building. It is important that the network be relatively cheap. Which topology should you use? a ring topology a mesh topology a bus topology a star topology

a star topology

WAN

a wide area network, i.e., a network formed from at least two LANs that are far enough apart to be linked through a outside supplier

Which of the following is NOT a required part of a network? a node packets a pointer an interconnector

an interconnector

Which of the following is an example of a cloud? an unknown network two computers connected by a cable two computers that share information via a flash drive moved from one to the other five computers that share information through a router

an unknown network

Compare the TCP/IP layers. Which does not require a header or footer? physical transport Internet application

application

Why does a bus topology require a terminator? because otherwise the signal will fade out because otherwise the packets will bounce back and forth from end to end repeatedly because a terminator is where a bus network connects to the outside because otherwise it would be a ring network

because otherwise the packets will bounce back and forth from end to end repeatedly

You need an inexpensive, reliable network for about twenty-five computers, all of which will be in two rooms. It is important that the network not entirely depend on one hub or one node. However, nodes will regularly be added and removed from the network, so flexibility is essential. Which topology should you use? mesh bus ring star

bus

Which of the following are parts of the physical layer? pins pointers connectors cables

pins connectors cables

packet

small units of data that travel through a network

OSI reference model

the Open Systems Interconnection standard for defining and organizing layers used to understand information technology networks

connector

the attachment at the end of a cable used to plug into a port

session layer

the fifth layer in the OSI reference model

network layer

the third layer in the OSI reference model

signal

the useful part of a transmission through a network

Match the TCP/IP Layer to a problem that can happen there. 1. Mistyped address 2. Packets fail to arrive 3. Server not found

3. Internet layer 2. transport layer 1. application layer

Which statement below correctly differentiates between frames and bits? Frames have more information in them than bits. Frames are more basic units of data than bits. Frames are made up of bits but not vice versa. Frames have less information than bits have.

Frames are made up of bits but not vice versa.

Which is NOT a question that might help a network engineer isolate which layer in a network has a problem? Is the user operating the software correctly? Are messages arriving in a timely manner? Are the data displaying in a garbled manner? Is everything plugged in?

Is the user operating the software correctly?

Jen's laptop, which is turned on and wirelessly connected to the home network router Her husband's PC, which connects to the router by a cable but is turned off Her mother's virus-infected computer, which has been unplugged from the router Her daughter's smart phone, which is wirelessly connected to the router If Jen's daughter is talking on her phone, and Jen's husband's computer is off, which computers are currently networked? All four, because they are all computers in the house, regardless of their present usage. Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. Just Jen's laptop, because her mom's computer is not connected to the router, her husband's computer is off, and her daughter's phone is not currently acting as a computer. None of them, because a network must have at least two devices wired by cable before it can be called a net

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Jorge says, "My smart phone is acting as a client when it checks e-mail over the Internet because it connects to a server, but it acts as a server when I'm making calls." Is Jorge correct, and if not, why not? Choose the best answer. Jorge is correct. He is not correct because Jorge's smart phone acts as a server when it checks e-mail. Jorge is correct about his smart phone acting as a client when it checks mail but incorrect about it acting as a server when calls are made. Jorge's smart phone is always a client, even when it is off.

Jorge is correct about his smart phone acting as a client when it checks mail but incorrect about it acting as a server when calls are made.

Compare a switch to a router. A switch and a router are different types of hubs. Switches, unlike routers, can be turned off to block hostile packets. Switches are more expensive than routers. Routers are more complex than switches.

Routers are more complex than switches.

Which of the following statements is False? A package passes through several MAC addresses to reach an IP address. IP addresses are used by the Internet layer. MAC addresses are used by the data-link layer. The MAC address marks the final destination of the frames.

The MAC address marks the final destination of the frames.

Compare the logical link control and the media access control. Which of the following is a correct statement? The logical link control regulates the timing of a frame's access to a part of a network. The media access control ensures successful traffic. The media access control is part of the network layer. The logical link control involves pointers sending frames and waiting for responses.

The logical link control involves pointers sending frames and waiting for responses.

Why is UDP less reliable than TCP? UDP does not include data reassembly. UDP is faster. UDP is an older protocol. UDP is only for sending small amounts of data.

UDP does not include data reassembly.

In a networking context, "architecture" refers to _____. the building that houses the network a well-built network design the hardware

design

Which of the following is NOT a network configuration? ring mesh ethernet bus

ethernet

A web topology is a network in which every node is connected to every other node. True False

false

The more redundancy, the better your network is. True False

false

The transport layer adds IP addresses to data. True False

false

What does the Address Resolution Protocol do? finds the address of the next routing device along the network pathway reports that a sender cannot be found transports packets, but does not include data reassembly sends files across a network

finds the address of the next routing device along the network pathway

end to end

from sending point to receiving point in a network

NAS

network-attached storage, a server that is dedicated to file sharing

Why are computer messages encapsulated? to make the messages more secure against anything from tampering to unauthorized reading to translate messages from one machine's programming language into another to allow an unintelligent machine to handle a sophisticated task to keep many small bits of data together in a single package

to allow an unintelligent machine to handle a sophisticated task

communicate

to control or exchange data with something or someone

Which answer represents the highest layer that network engineers are mainly concerned with? transport layer network layer OSI Layer application layer

transport layer

A network protocol is a set of rules defining communication between two devices. True False

true

Headers and footers are handling instructions. True False

true

Which of the following is not required in a network? computers users hardware software

users

When is Internet Control Message Protocol most often used? in the Network Access Layer when one needs to reassemble data sent via UDP when Internet Protocol does not apply when a receiver or sender cannot be located

when a receiver or sender cannot be located


Conjuntos de estudio relacionados

AP Euro Period 3 (1815-1914), AP Euro period 3

View Set

Life Insurance Study Guide Part 2

View Set

AGAMA BAB 6 - Ibadah Haji dan Umrah

View Set

Exam II- Chapter 8: The Sensorimotor System

View Set

Servers3.1 - Implementing Hyper V & Virtual Networks

View Set

WEEK 11 ADN220 [THE CONCEPT OF FAMILY]

View Set

Chapter 7: Managing Stress and Emotions

View Set