Data Comm Test 3
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____. a.sub-network c.server b.station d.client
A. sub-network
One of the more interesting applications for a dedicated segment network and a switch is creating a ____. a.virtual LAN c.shared LAN b.dedicated LAN d.local LAN
A. virtual LAN
Early local area networks transmitted data at only ____ million bits per second. a.1 b.10 c.100 d.1000
B. 10
The ____ standard was one of the first Ethernet standards approved. a.10Broad36 c.100BaseTX b.10Base5 d.100BaseT4
B. 10Base5
Active Directory is built around the ____. a.X.500 standard b.Lightweight Directory Access Protocol (LDAP) c.802.11 protocol d.Ethernet standard
B. Lightweight Directory Access Protocol (LDAP)
The first version of NetWare to gain widespread popularity was ____. a.Version 1 c.Version 5 b.Version 3 d.Version 6
B. Version 3
NDS is based on a well-known standard for directory services called ____. a.X.300 c.X.600 b.X.500 d.X.700
B. X.500
A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another. a.star-based c.ring-based b.bus-based d.star-ring-based
B. bus-based
In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub. a.shared c.distributed b.dedicated d.remote
B. dedicated
The SONET network topology is a ____. a.star c.bus b.ring d.star-bus
B. ring
The most popular contention-based protocol is ____. a.token ring b.round-robin c.carrier sense multiple access with collision avoidance (CSMA/CA) d.carrier sense multiple access with collision detection (CSMA/CD)
B. round-robin
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control. a.explicit c.forward explicit b.implicit d.backward explicit
B.implicit
The wireless LAN standards call a single-cell wireless LAN a(n) ______.
Basic Service Set (BSS)
____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur. a.Broadcast c.Circuit-switched b.Wireless d.Datagram
C. Circuit-switched
____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data. a.Explicit congestion control c.Connection admission control b.Implicit congestion control d.Buffer preallocation
C. Connection admission control
The wireless LAN term for a collection of multiple Basic Service Sets is ____. a.Multiple Service Set (MSS) c.Extended Service Set (ESS) b.Basic Service Set (BSS) d.Complex Service Set (CSS)
C. Extended Service Set (ESS)
The IEEE 802.3z standards are also known as ____ Ethernet. a.Switch c.Gigabit b.Fast d.Terabit
C. Gigabit
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand. a.PANs c.MANs b.LANs d.WANs
C. MANs
In a bus/tree topology, connecting to the cable requires a simple device called a(n) ____. a.hub c.tap b.router d.echo suppressor
C. Tap
NetWare ____ introduced NetWare Directory Services (NDS). a.Version 2 c.Version 4 b.Version 3 d.Version 6
C. Version 4
A transparent bridge creates the internal port table by using a form of ____. a.forward learning c.backward learning b.backward correction d.forward correction
C. backward learning
A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. a.site c.corporate b.network server d.single-user-single-station
C. corporate
In a ____ architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch. a.forward c.cut-through b.backward d.random-propagation
C. cut-through
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information. a.centralized c.distributed b.focalized d.local
C. distributed
To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer. a.load c.frame b.product d.payload
C. frame
In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____. a.frame space (FS) c.interframe space (IFS) b.frame time (FT) d.intraframe time (IFT)
C. interframe space (IFS)
A(n) ____ protocol is the software that allows a workstation to place data onto a local area network. a.error control c.medium access control b.noise control d.flow control
C. medium access control
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network. a.bus c.mesh b.star d.ring
C. mesh
A ____ is a server that has no cabinet or box, but resides on a single printed circuit card. a.peer-to-peer server c.server blade b.server appliance d.print server
C. server blade
An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user. a.login process c.user interface b.logout process d.loading process
C. user interface
The type of algorithm that tries to avoid collisions is called ______.
CSMA/CA
SONET rings typically have a failover time of ____ milliseconds. a.20 c.40 b.30 d.50
D. 50
The IEEE ____ standard is said to be capable of 100 Mbps wireless transmissions. a.802.11a c.802.11g b.802.11b d.802.11n
D. 802.11n
The ____ is essentially the interface device between the wireless user device and the wired local area network. a.wireless server c.NIC b.wireless workstation d.access point
D. Access Point
On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser. a.NetWare 3 c.NetWare 5 b.NetWare 4 d.NetWare 6
D. NetWare 6
The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information. a.iPrint c.Remote Manager b.iClient d.bindery
D. bindery
In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. a.explicit congestion control c.connection admission control b.implicit congestion control d.buffer preallocation
D. buffer preallocation
All wide area networks are collections of at least two basic types of equipment: a station and a ____. a.link c.workstation b.server d.node
D. node
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home. a.single-user-single-station c.site b.interactive user d.single-user-multiple-station
D. single-user-multiple-station
The two types of packet-switched networks are the datagram and the ____. a.static circuit c.standard circuit b.fixed circuit d.virtual circuit
D. virtual circuit
The ability to reroute in the event of a failure is called ______.
Failover
A common example of a connection-oriented network application is DNS. (T/F)
False
A network server requires at least three connections to the network in the form of a network interface card. (T/F)
False
Baseband signaling typically uses multiple digital signals to transmit data over the bus. (T/F)
False
Broadcast networks are as common as circuit-switched and packet-switched networks. (T/F)
False
CSMA/CA is the most popular LAN protocol. (T/F)
False
CSMA/CD is the only network technology that successfully supports connection admission control and quality of service. (T/F)
False
Compared to Dijkstra's least-cost routing algorithm, the flooding technique seems more complex. (T/F)
False
In a shared segment network, each workstation then has a private or dedicated connection. (T/F)
False
In the case of CSMA/CD local area networks, as the networks grow in size, their performance increases. (T/F)
False
Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers. (T/F)
False
Local area network Ethernet allows users to set their own data transfer rates. (T/F)
False
Most MANs are supported by Ethernet ring technology. (T/F)
False
NetWare 5 dropped the NDS distributed database of network resources. (T/F)
False
Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language. (T/F)
False
The 802.11 specification defined six different types of physical layer connections. (T/F)
False
The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. (T/F)
False
The local area network first appeared in the 1950s. (T/F)
False
The logical link control sublayer defines the layout or format of the data frame, simply called the frame. (T/F)
False
The most popular example of a contention-based protocol is the token-passing protocol. (T/F)
False
The path in a circuit-switched network exists only in the software. (T/F)
False
The sub-network of a wide area network is the logical infrastructure and thus consists of nodes and various types of interconnecting media. (T/F)
False
The underlying sub-network of a connectionless application cannot be a circuit-switched network. (T/F)
False
Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources. (T/F)
False
When a software package is installed on a multiuser system, it is not possible for multiple users to execute multiple copies of the single program. (T/F)
False
When all the routing information is in one place, it is difficult to make updates to the routing information. (T/F)
False
Wireless local area networks are typically found in seven basic configurations. (T/F)
False
Wireless sniffers cannot detect how far wireless signals reach. (T/F)
False
_____ objects are not composed of any objects and are usually entities such as the users, peripherals, servers, printers, queues, and other network resources.
Leaf
The ______ is an electronic device that performs the necessary signal conversions and protocol operations that allow the workstation to send and receive data on the network.
Network Interface Card (NIC)
_____ is a collection of techniques for interfacing multiple hard disk drives to a computer.
RAID
A bindery contains the data that pertains only to the server it resides in. (T/F)
True
A cut-through switch does not store a data frame and then forward it. (T/F)
True
A rule known as the 5-4-3 rule helps guide the design of a shared-access Ethernet. (T/F)
True
A virtual circuit breaks a large amount of data into n packets. (T/F)
True
Every software company may create its own brand of user licenses and may name them something unique. (T/F)
True
In reality, a multitasking operating system runs only one program at a time. (T/F)
True
NetWare 6 was the last version of Novell's network operating system. (T/F)
True
SONET was designed to support multiple streams of voice channels. (T/F)
True
The bus/tree topology was the first physical design used when local area networks became commercially available in the late 1970s. (T/F)
True
The first routing algorithm used within the Internet was called a distance vector routing algorithm. (T/F)
True
When peer-to-peer networks first appeared roughly 30 years ago, they were serverless networks. (T/F)
True
With the CSMA/CD protocol, only one workstation at a time can transmit. (T/F)
True
Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined _____.
application program interface (API)
A(n) ______ examines the destination address of a frame and either forwards or does not forward the frame, depending on some address information stored within the bridge.
filter
A(n) _____ is a large, complex program that can manage the common resources on most local area networks.
network operating system (NOS)
A(n) _____ is an object that is further composed of additional objects (examples of which include servers, printers, users, or groups of users).
organizational unit (OU)
A network limit, called the ____, can be placed on how many times any packet is copied. a.hop limit c.time to live b.hop count d.time to hop
A. hop limit
The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals. a.network c.print b.file d.operating system
A. network
With a system-based or ____ license, there is rarely a software counter controlling the current number of users. a.network server c.site b.interactive user d.corporate
A. network server
A(n) ____ sends messages to applications, an interactive user, or a system operator about the status of the current operation. a.operating system c.hub b.router d.switch
A. operating system
Depending on user requirements, a switch can interconnect two different types of CSMA/CD network segments: ____ segments and dedicated segments. a.shared c.local b.remote d.distributed
A. shared
A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository, or ____ server. a. file c.database b.printer d.application
A. File
____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network. a.NetWare Directory Services (NDS) c.LDAP b.Active Directory d.X.509
A. NetWare Directory Services (NDS)
____ software incorporates a fairly large number of network support tools. a.Network-monitoring c.Antispam b.Crash protection d.Backup
A. Network-monitoring
____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers. a.Unix c.Windows Me b.Linux d.Windows 95
A. Unix
A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates, and excess burst rates. a.bandwidth c.client b.server d.router
A. bandwidth
One of NetWare Version 3's main features is the ____. a.bindery c.X.509 b.LDAP d.iPrint
A. bindery
MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second. a.fiber-optic c.twisted-paired b.copper-wired d.coaxial-cabled
A. fiber-optic
____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today. a.Ethernet c.FDDI b.IBM Token Ring d.Wireless Ethernet
A. Ethernet
