Computer Science 108: Introduction to Networking Practice Final
In MPLS switching, the routing decision is made _____.
by the first routing device and forms the predefined path for subsequent routers
A computer can be a web server if it:
services web page requests by clients connecting to it
Which layer is the network layer in the OSI 7 layer model
3
The OSI Model is used to:
describe how communications happen across a network
Which of the following is true about half-duplex mode?
Data is transmitted in both directions but not at the same time.
In WANs, what advantage does the ring topology have over the bus topology?
Data transmission is multidirectional
If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
DLP
In order to check the nodes that are connected to a system, one can use the command
netstat
A typical communication network may consist of __________.
servers, internet connectivity devices, computers, routers and smart devices
What makes the symmetric DSL network type so different from the asymmetric type?
It has an equal balance between download and upload speeds.
What type of standards are built by the officials and network professionals in organizations?
Formal standards
What is the approximate distance between devices when establishing a connection using short-range wireless communication?
From a few centimeters to several meters
What are two common WAN (Wide Area Network) design types?
Hub and spoke; Full mesh topology
The organization that currently regulates and manages the Internet is _____.
ICANN
Which of the following wireless communication technologies has the shortest range?
Near Field Communication
What organization sets the rules as to how credit card data is handled?
PCI
Which internet protocol is responsible for re transmitting lost or erroneous data packets?
TCP
Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?
TCP/IP
How many nodes for a network would a /23 be good for address space in IPv4?
Up to 512
IMAP can allow a user with multiple devices to _____
access their emails simultaneously from any of the devices.
Which application operates in the frequency range 87.5 - 108 MHz?
FM Radio
When are guest accounts most likely necessary?
a doctor's office in the waiting room
Which of the following statements is true?
Authoritative name servers respond to queries from recursive name servers
IPv4 represents a _____-bit integer and IPv6 represents a _____-bit alphanumeric string.
32, 128
An office operates on 3 floors of a building. It comprises 4 different departments. Which of the following network implementation will most suit the office needs?
4 VLANs on 4 switches with trunk link connections
Which two protocols are NOT backward compatible?
802.11a Protocol 802.11b
If you didn't have access to a highly-skilled IT network team, what would be a good option for a WAN (Wide Area Network)?
A fully carrier managed WAN.
How does the use of a router differ from a bridge in telecommunication?
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
What is Address Translation(AT)?
AT is mapping private IP addresses to public IP addresses
SIP signaling protocol for VoIP and Video-over-IP allows for a connection to be modified. Which of these is an example of a session modification?
Adding an additional participant.
In a _____ topology network, all the devices are connected back to a central hub or switch.
Star
Frequency Division Multiplexing is not used in _____.
Air band radio
What is an IP address?
An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment
Apart from allowing a variety of media formats and sending multiple attachments at once, what other primary benefit did MIME bring to the world of email?
An unlimited number of characters in the body of the message.
Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time?
Asynchronous
Which network topology uses a central hub or controller?
Star
How does RIP route payloads?
By advertising a connected table to all neighbors every 30 seconds.
UDP is what type of protocol?
Connectionless
What part of an optical fiber cable reflects light back into the core as the cable bends?
Cladding
Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?
Coaxial
Which of the following statements about a VLAN environment is TRUE?
Computers or nodes by default are not VLAN aware
The Frame Check Sequence (FCS) within an Ethernet frame serves to _____
Detect corrupted data
Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?
Encryption
Crosstalk and attenuation are NOT a problem in which of the following media?
Fiber optic cable
What is the maximum number of zones that can be associated to a firewall?
Firewalls can have many zones associated to them.
The software or hardware used to connect two different networks is known as _____
Gateway
Which of the following devices can be used to interface computer networks that use different communication protocols?
Gateway
The command tracert is used for which of the following purpose?
Identifying the route that a packet travels in the network before reaching the destination
In what way is a peer-to-peer network different from client/server networks?
In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
Science and engineering orbital data are made accessible to the general public by use of the _____
Internet-to-orbit
Why is the role of RTCP important in VoIP communications?
It allows adjustments to be made to fine-tune transmissions.
What is the purpose of load balancing in a network?
It distributes traffic to allow for a balance in the network keeping services available
Which of the following problems would the OSI Model solve?
It would allow a Mac and a PC to be used on the same network.
An advantage of optical fiber over traditional copper wiring is:
Less bulk
The network layer converts:
Logical addresses into physical addresses
Which of the following statements is true?
MAC and IP addresses need to work in parallel for effective communication.
_____ was the reason why our emails and our web browsing experiences are more flexible with a wide variety of functions.
MIME
Why did the first version of WPA use TKIP?
Many old devices still used WEP and TKIP was intended to make it easy to upgrade.
Where does the cloud concept originate?
Network diagram
Which protocol downloads a copy of an email and deletes the original email from the server?
POP3
When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?
Plastic optical cable
PSTN stands for:
Public Switched Telephone Network
What are the reasons for the degradation of a wireless signal?
Reflection Diffraction ScatteringAll of the above
What service does a VPN solution provide?
Remote access to private network resources
Which of the following is NOT a basic component of a telecommunication network?
Remote control unit
Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?
Ring
When a user tries to access a web page, what does the system do first?
Searches the domain name in DNS.
A _____ network cannot be applied at enterprise level due to its high susceptibility to faults.
Serial backbone
MPLS makes use of _____ to make a faster and more efficient network.
Short path labels
The type of fiber used typically for long distance runs is:
Single-mode
Which type of network transmission mode transmits data in both directions simultaneously?
Synchronous
What main use does Telnet have in modern IT?
Telnet is often used for embedded devices.
Why is Telnet discouraged as an access method?
Telnet is unsecure.
The presentation layer of the OSI model translates data into an acceptable format usable by which layer?
The application layer
Which of the following is NOT true with respect to a band pass filter?
The band pass filter is present at the sender's side.
How do clients communicate with the server?
The network
At the 'receiving' computer, the transport layer provides input to which OSI layer?
The session layer
Which of these is NOT true about cloud computing?
There are no privacy concerns.
Why are addresses important in networking?
They are used to identify both the network to which the device is connected to as well as the device itself.
In the OSI model, what does the application layer do?
This layer actively interacts with the operating system or application when the user decides to transfer files, read messages, or perform network-related activities.
Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?
To enable the peer devices to exchange data without much difficulty.
A remote employee needs to be able to access corporate email and file sharing but doesn't necessarily have a lot of technical knowledge. What is the best access method?
VPN
What type of video-over-IP service relies on two-way communication?
Video conferencing
VOIP stands for:
Voice Over Internet Protocol
What are WLAN Protocols?
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
_____ is a simplified setup procedure available on some wireless routers and access points.
WPS
Let's say you're at home trying to make an important video call for work and your family is on the same network streaming other things at the same time. Your network was never the best to begin with, but good enough. What might happen if you did not have a proper QoS policy set up?
Your video stream could suffer, making your experience subpar
Which of these would most likely benefit from registering its MAC addresses.
a small investment firm
What factors should you consider in selecting a WAN (Wide Area Network) service provider?
all of these
What networking organizations set the standards for network communication?
all of these answers are correct
Wireless transmission happens when wireless equipment converts _____.
an electric current to electromagnetic waves
A specially built server:
is built with redundant power supplies to maintain constant availability
According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.
not likely
A specially designed server operating system can serve:
numerous concurrent clients connections
In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.
permissions
The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.
physical