C724:_Unit_5-8_Q&A
What is the difference between a LAN and a WAN?
A LAN connects computer systems locally, whereas a WAN connects systems over a long distance.
The term 'generations' is used to describe changes in which type of technology?
Cellular wireless standards
When streaming data or voice, which type of switched network is used?
Circuit switch
In asynchronous communications, two people in separate locations can communicate with each other during different times of the day. Which is an example of asynchronous communication:
Collaboration among participants via online message boards
What is a benefit of telecom services convergence for business?
Combining data, voice, and video into one platform means having only one network to service and maintain.
What is meant by a 'Core' router?
Core routers 'collapse' the network into a backbone for high bandwidth communication.
Which of the following is not a telecommunications network protocol?
DOS
What is the best description of how a packet switched network works?
Data is digitized, enclosed in packets, and transmitted.
What is another name for a network host?
Data terminal equipment
Which of the following is a disadvantage of using a VPN?
Expensive
[True/False] 4G networks, also called Long-Term Evolution (LTE), offer data transmission speeds of 64 kbps in the Ultra High Frequency band.
False
The Network address translation (NAT) technology allows private users to ________________________.
redefine network addresses to assign their own addresses
[True/False] An information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.
False
[True/False] Coaxial cable is the required medium for telecommunication transmissions.
False
[True/False] Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP addresses into the URL. All domain names must have four parts, regardless of where the websites are located. Each part is written as a set of octets and is separated by a period.
False
[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone.
False
[True/False] When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols.
False
[True/False] With security measures already implemented in the network systems, it is not necessary for telecommuters to use a secured connection, such as the Virtual Private Network (VPN), to gain remote access to their work servers.
False
[True/False] The Open System Interconnection model consists of five layers.
False - 7 Layers
The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture?
The client has control over the applications residing on the server. (the server, not the client, has control over the applications residing on the server)
A reliable intranet connection provides organizations and their suppliers and vendors with ________________________________.
a secure platform for internal use
To facilitate efficient and effective business, corporations utilize the _____________________ for communications with suppliers and vendors.
extranet
Internet Protocol version 4 (IPv4) was created and standardized in the 1970s by the original ARPANET group to _________________________________.
facilitate communications
The advent of the Internet has revolutionized our lives, becoming a vast resource for information, utility, and productivity. Which statement below about the Internet is FALSE?
(False:) Once you upload your data to the Internet, it will be available to the public.
How many layers are in the standard OSI model?
7- physical, data, network, transport, session, presentation, application
What is the typical broadband data speed of a 4G network?
100,000 kbps
What is the primary difference between a 1G cellular network and the current 4G network?
1G enabled mobile voice telecommunication while 4G offers voice, data and video.
Which of the following best describes the first generation of mobile networks?
1G networks were "voice only" analog communication networks.
Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?
25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP
Organizations can exchange data and files through cloud computing or a VPN. Which of the following is an advantage of a VPN, but not an advantage of cloud computing?
A VPN provides more secure access than cloud computing.
What is the difference between a hertz and a byte?
A byte is a unit of digital information, whereas a hertz is the standard measurement of frequency.
What is a denial of service attack?
A hacker attempt to tie up network host resources making them unavailable.
What is the function of a network bridge?
A network bridge links two network LANs together.
What is a network management application?
A network management application retrieves and analyzes network traffic data.
What is a radio frequency survey?
A radio frequency survey is a signal strength detection process to identify the best wireless access point locations.
Which of the following best describes a telecommunications network?
A system of nodes and links
Which of the following statements is FALSE?
An advantage to wireless communication is that information is available from anywhere, but the main disadvantage is that networks cannot easily be reconfigured because there is no physical wiring.
For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet?
Banking transactions - must be encrypted to be safely communicated over the internet
How do small businesses and large enterprises protect themselves from network intrusions?
Both small and large enterprises use firewalls to prevent intrusion.
Why is it imperative that modern businesses have a social media marketing strategy?
Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care.
[True/False] Spoofing a network is a false representation of digital identity and leads to less packet encapsulation information as the network responds.
False - When a network is spoofed, it sends useful data back to the source to enable it to connect. This information can help a hacker penetrate the network.
[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals.
False - it uses RADIO waves over the RADIO spectrum
Which of the following is not a circuit switching protocol?
IP
Which of the following application provided by the Internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee?
Information repositories
Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following IS a benefit of an extranet?
Interact with suppliers - often via an SCM
What is the Internet of Things (IoT)?
Internet of Things means connectivity of all devices to enable service automation.
The converged communications structure is based on what?
Internet, audio communications, and the PSTN
In the near future, most devices, such as home appliances, automobiles, and consumer product packages, will be connected to the Internet. What is this field of networking called?
IoT
Which of the following statement about the IP version 4 (IPv4) addressing scheme is true?
It has 4 bytes, which is equivalent to 32 bits.
What is a key trend in mobile communications that businesses must be aware of?
Mobile access to the Internet is growing exponentially.
What are three reasons that more businesses are deploying wireless networks?
Mobility, cost, and scalability
The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?
More complexity due to the need for more systems and better improvements in their processing capabilities.
Are hypervisors or hypervisor applications necessary in small businesses with simple networks?
No, a hypervisor is a computer software that enables network virtualization and is not necessary.
What does OSI stand for?
Open System Interconnection
Which of the following is not a wireless telecommunication networking protocol?
POP
What is the public switch telephone network (PSTN)?
PSTN is the voice telephone network around the globe.
What does PSDN stand for?
Packet Switched Data Networks
What is a benefit of packet switching?
Packet switching does not need a dedicated network connection.
What are the two fundamental protocols that can describe modern telecom networks?
Packet transmission and TCP/IP protocol.
What is the advantage of RFID passive tags?
Passive tags leverage energy from radio signals.
What information can be gained by sniffing a wireless network?
Passwords and Login IDs
What are peer-to-peer network topologies?
Peer-to-peer topologies connect each user in a network directly.
Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered?
RFID
What is the role of repeaters in telecommunication networks?
Repeaters are used to amplify signals as they travel in a network.
Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day?
SMTP - (simple mail transfer protocol) the popular mail protocols include IMAP and POP3
What is meant by wireless networks being scalable?
Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure.
Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop?
Smartphone
What is the most prevalent hacker attack on wireless networks?
Sniffing
What are three risks to wireless networks?
Sniffing, spoofing, and probing
Why should businesses have a social media strategy?
Social media is an ubiquitous marketing channel.
The Internet standard defines how computers and devices route communications traffic from one network to another over the Internet. What is this Internet standard known as?
TCP/IP
_________________________ is a universal telecommunication network protocol that most operating systems can recognize.
TCP/IP
Which of the following is a characteristic of a legacy or old analog network?
They carried continuous electronic waveforms.
The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?
To increase the number of unique IP addresses.
Packet switching refers to a computer network's ability to do what?
Transmit information in discrete, parsed data encapsulated in packets.
[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider.
True
[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions.
True
[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises.
True - Wireless LANs allow visitors (customers or suppliers) to access the internet and their information systems for collaboration and decision making.
A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs?
URL (uniform resource locator)
In asynchronous communication, participant communication is not concurrent. Why is this an advantage of email?
Users can send or reply to messages on their own schedule.
Which of the following is correct about virtual networks?
Virtual networks function through network virtualization.
Why is WPA critical to wireless networks?
WPA (Wi-Fi Protected Access) is a tunneling encryption protocol that secures wireless data transmissions.
___________________________ are located in strategic locations and used to monitor physical or environmental conditions.
WSNs
Which of the following best describes wireless sensor networks (WSNs)?
WSNs are spatially distributed sensors.
The Internet was initially developed using a telephone connection. Which of the following is an innovative application provided by the Internet?
Web enabled storefront
Which of the following application provided by the Internet allows an online retailer to conduct business?
Web enabled storefront
When would client computers using TCP/IP in a client/server network not be able to communicate with each other?
When a client computer is offline and not connected to the Internet
What does WSN stands for?
Wireless Sensor Networks
VoIP technology is currently a very popular form of communications because it ______________________________________.
delivers voice information in digital form using packet switching
A router connects data links from a single network and transmits data packets between ______________________________________.
different networks
Cloud computing is becoming more popular because users ___________________________________________.
have more flexibility than they do with VPN
To facilitate efficient and effective business, corporations utilize the ____________________ to communicate with their customers.
internet
To facilitate efficient and effective business, corporations utilize the ______________________ to manage employees' affairs.
intranet
Social networks must be targeted by businesses since social networking is a _________________ channel.
media
Internet access via ______________________________ devices is growing exponentially, surpassing Internet access by fixed, desktop computers.
mobile
Wireless LAN networks are _____________________________________________.
more scalable than wired networks.
Wireless LAN networks support the on-premise workforce, making them more mobile, which increases _______________________ and access to real-time information.
productivity
Wired networks may not be advantageous because of the large amount of cables involved, but they provide businesses with network reliability and _____________________________.
security
An important downside to a converged computer network is that when it goes down, _____________________________ is disabled.
telephone service
The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity. This resulted in more complexity due to _________________________________________________.
the need for more systems and better processing capabilities