MIS 140 Exam #2 Questions
16. The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.
False Difficulty: Medium Reference: Technology Design
50. Wi-Fi Protected Access (WPA) uses the same key for every packet that is transmitted to the client.
False Difficulty: Medium Reference: Wireless Ethernet
19. An example of an application layer address is www.indiana.edu
True Difficulty: Easy Reference: Addressing
21. The data link layer address is generally encoded in a network card by the card's manufacturer.
True Difficulty: Easy Reference: Addressing
24. The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host Control Protocol.
True Difficulty: Easy Reference: Addressing
9. One of the most important functions of Network Operating System (NOS) is a directory service.
True Difficulty: Easy Reference: LAN Components
8. Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer
A Difficulty: Medium Reference: LAN Components
16. __________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales
A Difficulty: Medium Reference: Needs Analysis
34. ___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing
A Difficulty: Medium Reference: Routing
35. The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table
A Difficulty: Medium Reference: Routing
Understand the best practice recommendations for LAN design 46. The data link layer protocols used by wireless LANs are similar to the ones used on Ethernet LANs
True Difficulty: Easy Reference: Wireless Ethernet
23. Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet.
True Difficulty: Medium Reference: Addressing
28. An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address.
True Difficulty: Medium Reference: Addressing
48. Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet
A Difficulty: Medium Reference: TCP/IP Example
22. Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA
A Difficulty: Medium Reference: Technology Design
65. A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest
A Difficulty: Medium Reference: Wireless Ethernet
28. To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node
A Difficulty: Medium Reference: Technology Design
31. There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement
A Difficulty: Medium Reference: Technology Design
59. Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks
A Difficulty: Medium Reference: The Best Practice LAN Design
16. The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed
A Difficulty: Medium Reference: Wired Ethernet
25. 1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX
A Difficulty: Medium Reference: Wired Ethernet
5. The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer
True Difficulty: Medium Reference: Introduction
32. Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.
A Difficulty: Medium Reference: Wired Ethernet
48. How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above
A Difficulty: Medium Reference: Wireless Ethernet
50. __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical
A Difficulty: Medium Reference: Wireless Ethernet
25. IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16
A Difficulty: Easy Reference: Addressing
37. Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more
A Difficulty: Easy Reference: Cost Assessment
37. Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE
A Difficulty: Easy Reference: Improving LAN Performance
10. In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
A Difficulty: Easy Reference: Introduction
4. Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox
A Difficulty: Easy Reference: Introduction
7. Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network
A Difficulty: Easy Reference: Introduction
7. Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair
A Difficulty: Easy Reference: LAN Components
18. Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer
A Difficulty: Easy Reference: Needs Analysis
44. A type of message that is used when sending a message from one computer to another computer is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
A Difficulty: Easy Reference: Routing
26. ___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation
A Difficulty: Easy Reference: Technology Design
20. With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses
A Difficulty: Easy Reference: Transport Layer Functions
12. Network profile refers to what resources on each server are available on the network for use by other computers and which devices or people are allowed access on the network.
True Difficulty: Medium Reference: LAN Components
22. When a switch receives a packet with a destination address that is not in its forwarding table, the switch will broadcast the packet to all of its ports.
True Difficulty: Easy Reference: Wired Ethernet
25. A switch can send and receive on all circuits simultaneously.
True Difficulty: Easy Reference: Wired Ethernet
29. An access point (AP) is required to connect a WLAN to a wired network.
True Difficulty: Easy Reference: Wireless Ethernet
30. An access point ensures that all computers within range of the access point can communicate with each other,
True Difficulty: Easy Reference: Wireless Ethernet
33. Directional antennas signals are much stronger than omnidirectional antennas.
True Difficulty: Easy Reference: Wireless Ethernet
39. The frequency ranges of some access points are the same as some cordless telephones.
True Difficulty: Easy Reference: Wireless Ethernet
40. 802.11a provides for speeds of up to 54 Mbps under perfect conditions.
True Difficulty: Easy Reference: Wireless Ethernet
42. 802.11a LANs provide more channels than 802.11b LANs
True Difficulty: Easy Reference: Wireless Ethernet
43. It takes 802.11a more access points to provide the same coverage as one 802.11b access point.
True Difficulty: Easy Reference: Wireless Ethernet
Understand the best practice recommendations for LAN design 44. An 802.11g NIC can communicate with an 802.11n access point.
True Difficulty: Easy Reference: Wireless Ethernet
3. By offloading printing tasks from the main LAN server, a print server increases network efficiency.
True Difficulty: Medium Reference: LAN Components
7. Many network hubs incorporate repeaters or amplifiers to regenerate signals so that attenuation of the signal does not occur.
True Difficulty: Medium Reference: LAN Components
14. Networks requirements can be divided into mandatory, desirable, and wish-list requirements.
True Difficulty: Medium Reference: Needs Analysis
35. Enhanced Interior Gateway Routing Protocol is a dynamic link state interior routing protocol developed by Cisco.
True Difficulty: Medium Reference: Routing
17. Simulation is a tool that can be used in designing networks.
True Difficulty: Medium Reference: Technology Design
12. To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application layer port addresses to distinguish among many open applications on a computer
True Difficulty: Medium Reference: Transport Layer Functions
28. Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.
A Difficulty: Easy Reference: Wired Ethernet
44. The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g
A Difficulty: Easy Reference: Wireless Ethernet
22. A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO
A Difficulty: Medium Reference: Addressing
33. _________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request
A Difficulty: Medium Reference: Addressing
33. Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system
A Difficulty: Medium Reference: Cost Assessment
36. RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol
A Difficulty: Medium Reference: Cost Assessment
41. The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
A Difficulty: Medium Reference: Introduction
10. _____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System
A Difficulty: Medium Reference: LAN Components
11. The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system
A Difficulty: Medium Reference: LAN Components
6. Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above
A Difficulty: Medium Reference: LAN Components
53. IPv4 provides ___________ IP addresses. a. a. 4.3 billion b. b. 144 million c. c. 64 billion d. d. 3.14 billion e. e. 1 million
A Difficulty: Easy Reference: Addressing
51. The ______ defines what type of packets should be routed and what types of packets should be discarded. a. ACL b. AFL c. TCP d. IOS e. OSI
A Difficulty: Easy Reference: Routing
68. ____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy
A Difficulty: Medium Reference: The Best Practice LAN Design
70. The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck
A Difficulty: Medium Reference: The Best Practice LAN Design
63. IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz
A Difficulty: Medium Reference: Wireless Ethernet
64. WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a
A Difficulty: Medium Reference: Wireless Ethernet
28. The maximum data rate of 802.11b LANs is 12 Mbps.
False Difficulty: Easy Reference: Wireless Ethernet
54. The _____ address range is reserved for a computer to communicate with itself and is called the loopback. a. 121 b. 127 c. 239 d. 254 e. 111
B Difficulty: Easy Reference: Addressing
7. The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer.
C Difficulty: Medium Reference: Transport and Network Layer Protocols
33. Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching
C Difficulty: Medium Reference: Wired Ethernet
46. A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
D Difficulty: Medium Reference: LAN Components
23. Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs
D Difficulty: Medium Reference: Technology Design
67. The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer
E Difficulty: Medium Reference: The Best Practice LAN Design
28. Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks
E Difficulty: Easy Reference: Addressing
15. The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design
E Difficulty: Easy Reference: Needs Analysis
20. Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center
E Difficulty: Easy Reference: Technology Design
30. Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service
E Difficulty: Medium Reference: Addressing
35. To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors
E Difficulty: Medium Reference: Cost Assessment
38. Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server's CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance
E Difficulty: Medium Reference: Improving LAN Performance
3. Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware
E Difficulty: Medium Reference: Introduction
17. Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP
E Difficulty: Medium Reference: Transport Layer Functions
37. Connections on a router, to the Internet and other routers for example, are called applications.
False Difficulty: Easy Reference: Routing
20. The network layer address for IP is ten bytes long when using IPv4.
False Difficulty: Easy Reference: Addressing
22. IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.
False Difficulty: Easy Reference: Addressing
19. When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.
False Difficulty: Easy Reference: Cost Assessment
2. The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.
False Difficulty: Easy Reference: Introduction
35. Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before transmitting any more packets.
True Difficulty: Medium Reference: Wireless Ethernet
36. Point Coordination Function requires that each station that wishes to transmit on the wireless network sends a request-to-transmit (RTS) packet to the access point and waits for a clear-to-send (CTS) packet from the AP before it can communicate with other nodes on the network.
True Difficulty: Medium Reference: Wireless Ethernet
38. 802.11b LANs operate at speeds up to 11 Mbps.
True Difficulty: Medium Reference: Wireless Ethernet
57. The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
D Difficulty: Easy Reference: Wireless Ethernet
24. IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8
D Difficulty: Medium Reference: Addressing
8. The NOS software for the server computer provides the physical, data link, and network layer functions.
False Difficulty: Medium Reference: LAN Components
30. There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing.
False Difficulty: Medium Reference: Routing
36. A multicast message can be used to send a message to a maximum of two other computers.
False Difficulty: Medium Reference: Routing
16. Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.
False Difficulty: Medium Reference: Transport Layer Functions
1. As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.
False Difficulty: Medium Reference: LAN Components
17. TCP/IP operates only as connection-oriented.
False Difficulty: Medium Reference: Transport Layer Functions
1. TCP/IP is a data link protocol that is used on the Internet.
False Difficulty: Medium Reference: Transport and Network Layer Protocols
15. The Ethernet standard was developed first by the IEEE.
False Difficulty: Medium Reference: Wired Ethernet
21. Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design
C Difficulty: Easy Reference: Introduction
34. Wireless LANs use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medic access control.
False Difficulty: Medium Reference: Wireless Ethernet
37. The DCF function of Wi-Fi resolves the hidden node problem.
False Difficulty: Medium Reference: Wireless Ethernet
36. LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor
B Difficulty: Easy Reference: Improving LAN Performance
39. Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice
B Difficulty: Easy Reference: Cost Assessment
40. To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server
B Difficulty: Easy Reference: Improving LAN Performance
41. Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation
B Difficulty: Easy Reference: Improving LAN Performance
1. The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link
B Difficulty: Easy Reference: Introduction
2. The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing
B Difficulty: Easy Reference: Introduction
6. The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat
B Difficulty: Easy Reference: Introduction
9. In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
B Difficulty: Easy Reference: Introduction
3. Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system
B Difficulty: Easy Reference: LAN Components
45. A special type of message that is used when sending the same message to a specific group of computers is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
B Difficulty: Easy Reference: Routing
9. The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit
B Difficulty: Easy Reference: Transport and Network Layer Protocols
18. ___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control
B Difficulty: Easy Reference: Wired Ethernet
19. The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected
B Difficulty: Easy Reference: Wired Ethernet
30. A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion
B Difficulty: Easy Reference: Wired Ethernet
34. Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
B Difficulty: Easy Reference: Wired Ethernet
31. When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet
B Difficulty: Medium Reference: Addressing
21. An application layer address using TCP/IPv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3
B Difficulty: Medium Reference: Addressing
26. A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net
B Difficulty: Medium Reference: Addressing
1. Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.
B Difficulty: Medium Reference: Introduction
42. The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
B Difficulty: Medium Reference: Introduction
12. _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services
B Difficulty: Medium Reference: LAN Components
13. A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint
B Difficulty: Medium Reference: LAN Components
13. In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue
B Difficulty: Medium Reference: Needs Analysis
14. Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP
B Difficulty: Medium Reference: Needs Analysis
36. In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table
B Difficulty: Medium Reference: Routing
43. The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First
B Difficulty: Medium Reference: Routing
24. Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps
B Difficulty: Medium Reference: Technology Design
12. Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: a. data link layer address b. port address c. application layer address d. network address e. IP address
B Difficulty: Medium Reference: Transport Layer Functions
15. A TCP connection is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless
B Difficulty: Medium Reference: Transport Layer Functions
5. TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures
B Difficulty: Medium Reference: Transport and Network Layer Protocols
8. TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value
B Difficulty: Medium Reference: Transport and Network Layer Protocols
22. Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting
B Difficulty: Medium Reference: Wired Ethernet
31. Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.
B Difficulty: Medium Reference: Wired Ethernet
35. Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak
B Difficulty: Medium Reference: Wired Ethernet
52. Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode
B Difficulty: Medium Reference: Wireless Ethernet
55. 802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5
B Difficulty: Medium Reference: Wireless Ethernet
29. ___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding
C Difficulty: Easy Reference: Addressing
48. A site survey is not an important component of a WLAN design.
False Difficulty: Medium Reference: Wireless Ethernet
52. _________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization. a. TCP/IP b. ARPANET c. ARIN d. AIS e. OSPF
C Difficulty: Easy Reference: Addressing
55. IP addresses from 224 to 239 belong to Class D and are reserved for a. the government b. ISPs c. multicasting d. broadcasting e. private networks
C Difficulty: Easy Reference: Addressing
69. A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN
C Difficulty: Medium Reference: The Best Practice LAN Design
8. Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer
C Difficulty: Easy Reference: Introduction
15. A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list
C Difficulty: Easy Reference: LAN Components
45. A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
C Difficulty: Easy Reference: LAN Components
46. A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message
C Difficulty: Easy Reference: Routing
27. __________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer
C Difficulty: Easy Reference: Technology Design
17. Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva
C Difficulty: Easy Reference: Wired Ethernet
26. ________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet
C Difficulty: Easy Reference: Wired Ethernet
43. Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g
C Difficulty: Easy Reference: Wireless Ethernet
49. __________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical
C Difficulty: Easy Reference: Wireless Ethernet
23. ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes
C Difficulty: Medium Reference: Addressing
2. __________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer
C Difficulty: Medium Reference: Introduction
14. A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS
C Difficulty: Medium Reference: LAN Components
2. A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server
C Difficulty: Medium Reference: LAN Components
5. Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media
C Difficulty: Medium Reference: LAN Components
38. An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing
C Difficulty: Medium Reference: Routing
39. With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state
C Difficulty: Medium Reference: Routing
40. ____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing
C Difficulty: Medium Reference: Routing
42. One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing.
C Difficulty: Medium Reference: Routing
29. According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20
C Difficulty: Medium Reference: Technology Design
30. A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan
C Difficulty: Medium Reference: Technology Design
18. ______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented
C Difficulty: Medium Reference: Transport Layer Functions
13. The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings
D Difficulty: Easy Reference: Transport Layer Functions
11. The newer form of IP, version 6 (Ipv6): a. Is running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header
C Difficulty: Medium Reference: Transport and Network Layer Protocols
51. CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance
C Difficulty: Medium Reference: Wired Ethernet
47. How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2
C Difficulty: Medium Reference: Wireless Ethernet
53. When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem
C Difficulty: Medium Reference: Wireless Ethernet
60. Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect.
C Difficulty: Medium Reference: Wireless Ethernet
61. _____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying
C Difficulty: Medium Reference: Wireless Ethernet
13. Traditional Ethernet is also known as shared Ethernet.
True Difficulty: Easy Reference: Wired Ethernet
6. A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte
D Difficulty: Easy Reference: Transport and Network Layer Protocols
49. Which of the following is not a component of a router? a. CPU b. Interface c. Memory d. Keyboard e. Port
D Difficulty: Easy Reference: Routing
50. A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System
D Difficulty: Easy Reference: Routing
66. The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer
D Difficulty: Medium Reference: The Best Practice LAN Design
32. When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet
D Difficulty: Easy Reference: Addressing
34. Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers
D Difficulty: Easy Reference: Cost Assessment
38. Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture
D Difficulty: Easy Reference: Cost Assessment
11. In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
D Difficulty: Easy Reference: Introduction
3. _______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25
D Difficulty: Easy Reference: Introduction
4. Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common.
D Difficulty: Easy Reference: Introduction
19. Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network
D Difficulty: Easy Reference: Needs Analysis
41. _______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing
D Difficulty: Easy Reference: Routing
47. IGMP refers to: a. Internet Giga Memory Parameters b. Interchange Group Management Parameters c. Internet Guided Meta Protocol d. Internet Group Management Protocol e. Interchange Guided Meta Protocol
D Difficulty: Easy Reference: Routing
54. The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
D Difficulty: Easy Reference: Wireless Ethernet
27. A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255
D Difficulty: Medium Reference: Addressing
40. The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented
D Difficulty: Medium Reference: Cost Assessment
42. Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines
D Difficulty: Medium Reference: Improving LAN Performance
1. A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server
D Difficulty: Medium Reference: LAN Components
12. Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network
D Difficulty: Medium Reference: Needs Analysis
25. In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage
D Difficulty: Medium Reference: Technology Design
32. ________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users
D Difficulty: Medium Reference: Technology Design
14. The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request
D Difficulty: Medium Reference: Transport Layer Functions
16. _____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net
D Difficulty: Medium Reference: Transport Layer Functions
19. UDP is not commonly used for: a. network management control messages b. RIP messages c. DHCP addressing messages d. HTTP requests e. routing control messages
D Difficulty: Medium Reference: Transport Layer Functions
10. IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions
D Difficulty: Medium Reference: Transport and Network Layer Protocols
20. A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe
D Difficulty: Medium Reference: Wired Ethernet
21. Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider
D Difficulty: Medium Reference: Wired Ethernet
27. 10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network
D Difficulty: Medium Reference: Wired Ethernet
56. How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8
D Difficulty: Medium Reference: Wireless Ethernet
58. Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15
D Difficulty: Medium Reference: Wireless Ethernet
62. With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP
D Difficulty: Medium Reference: Wireless Ethernet
39. If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable
E Difficulty: Medium Reference: Improving LAN Performance
2. A Network Operating System (NOS), such as Linux or Windows Server 2008, must be used in addition to the 'normal' operating system, such as Windows, on a server in a dedicated server LAN.
False Difficulty: Medium Reference: LAN Components
5. Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities
E Difficulty: Medium Reference: Introduction
4. Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)
E Difficulty: Medium Reference: LAN Components
9. __________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables
E Difficulty: Medium Reference: LAN Components
17. Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices
E Difficulty: Medium Reference: Needs Analysis
37. The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing
E Difficulty: Medium Reference: Routing
23. _________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet
E Difficulty: Medium Reference: Wired Ethernet
24. 10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct
E Difficulty: Medium Reference: Wired Ethernet
29. Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously
E Difficulty: Medium Reference: Wired Ethernet
4. The Network Interface Card (NIC) permits a computer to be physically connected to a network's cable, which provides the network layer connection among the computers in the network.
False Difficulty: Medium Reference: LAN Components
3. The network layer is responsible for end-to-end delivery of the message.
False Difficulty: Easy Reference: Introduction
3. The traditional network design approach works very well for rapidly changing networks.
False Difficulty: Easy Reference: Introduction
4. The transport layer routes messages thought the network selecting the best path from the source to the destination station.
False Difficulty: Easy Reference: Introduction
5. Today, the most expensive part of the network is the hardware.
False Difficulty: Easy Reference: Introduction
5. LANs that run on radio frequencies use a type of wired media.
False Difficulty: Easy Reference: LAN Components
6. Fiber optic cable is thicker and heavier than unshielded twisted pair.
False Difficulty: Easy Reference: LAN Components
10. The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs.
False Difficulty: Easy Reference: Needs Analysis
12. The goal of the needs analysis step in network design is to develop a physical network design.
False Difficulty: Easy Reference: Needs Analysis
13. Today, all network traffic is due to traffic from internal application systems.
False Difficulty: Easy Reference: Needs Analysis
31. When using dynamic routing, routing decisions are always made by a central host or server.
False Difficulty: Easy Reference: Routing
34. A routing protocol used inside an autonomous system is called an exterior routing protocol.
False Difficulty: Easy Reference: Routing
14. The standard port number for Telnet is 53.
False Difficulty: Easy Reference: Transport Layer Functions
11. The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits.
False Difficulty: Easy Reference: Transport and Network Layer Protocols
6. TCP is the network layer protocol used on the Internet today.
False Difficulty: Easy Reference: Transport and Network Layer Protocols
7. IP is responsible for error-free delivery of packets on a TCP/IP network.
False Difficulty: Easy Reference: Transport and Network Layer Protocols
9. The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.
False Difficulty: Easy Reference: Transport and Network Layer Protocols
14. Ethernet is a layer 3 protocol, which operates at the network layer.
False Difficulty: Easy Reference: Wired Ethernet
18. The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps.
False Difficulty: Easy Reference: Wired Ethernet
19. 1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.
False Difficulty: Easy Reference: Wired Ethernet
20. A switch always broadcasts all the packets it receives to all the computers that are connected to the switch.
False Difficulty: Easy Reference: Wired Ethernet
23. Cut through switching has fewer errors than store and forward switching.
False Difficulty: Easy Reference: Wired Ethernet
24. Store and forward switching cannot be used unless incoming and outgoing data circuit has the same data rate.
False Difficulty: Easy Reference: Wired Ethernet
26. Wireless LANs are never connected to a wire network.
False Difficulty: Easy Reference: Wireless Ethernet
32. Most access points (AP) deployed in wireless LANs use directional antennas.
False Difficulty: Easy Reference: Wireless Ethernet
41. The maximum transmission speed of 802.11a LANs is 11 Mbps.
False Difficulty: Easy Reference: Wireless Ethernet
45. Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point.
False Difficulty: Easy Reference: Wireless Ethernet
47. Wireless LANs do not share the bandwidth capacity of the wireless network.
False Difficulty: Easy Reference: Wireless Ethernet
Understand the best practice recommendations for LAN design 27. 802.11b is a faster wireless standard than 802.11a.
False Difficulty: Easy Reference: Wireless Ethernet
7. Needs analysis is the final step in the building block approach to network design.
False Difficulty: Medium Reference: Introduction
16. Topology refers to the geometric layout of the network and describes how the computers are interconnected.
True Difficulty: Easy Reference: Wired Ethernet
25. Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.
True Difficulty: Easy Reference: Addressing
26. Part of the function of address resolution is translating the application layer address of the destination into a network layer address.
True Difficulty: Easy Reference: Addressing
27. Domain Name Servers provide the equivalent of directory assistance for application layer addresses.
True Difficulty: Easy Reference: Addressing
18. Cost assessment is the step in the network design in which many complex factors related to costs are documented.
True Difficulty: Easy Reference: Cost Assessment
1. A key problem when designing data communications networks is how to adapt to new technologies while organizations change.
True Difficulty: Easy Reference: Introduction
2. A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications.
True Difficulty: Easy Reference: Introduction
20. The campus backbone is usually faster than the backbones used inside buildings.
True Difficulty: Easy Reference: Introduction
4. Today, most network designers use a three to five year planning horizon.
True Difficulty: Easy Reference: Introduction
6. Today, many organizations design networks using the building-block approach.
True Difficulty: Easy Reference: Introduction
8. In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.
True Difficulty: Easy Reference: Introduction
9. Cost assessment is used to look at the relative cost of technologies used in a network design.
True Difficulty: Easy Reference: Introduction
10. LDAP is an industry standard directory protocol.
True Difficulty: Easy Reference: LAN Components
11. A hardware device that is not included in a network profile cannot be accessed by another computer on the network.
True Difficulty: Easy Reference: LAN Components
11. The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared.
True Difficulty: Easy Reference: Needs Analysis
29. Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient.
True Difficulty: Easy Reference: Routing
32. A hop in a routing calculation is defined as one link or circuit.
True Difficulty: Easy Reference: Routing
33. An autonomous system is a network operated by one organization.
True Difficulty: Easy Reference: Routing
15. Capacity planning is used to design circuit capacity.
True Difficulty: Easy Reference: Technology Design
13. Source port address is the logical address generated by the application layer on the source computer to identify the application, which is sending the data.
True Difficulty: Easy Reference: Transport Layer Functions
18. Quality of Service routing is a special type of connection-oriented routing in which different connections are assigned different priorities.
True Difficulty: Easy Reference: Transport Layer Functions
8. The TCP portion of TCP/IP performs linking to the application layer.
True Difficulty: Easy Reference: Transport and Network Layer Protocols
15. Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller packets.
True Difficulty: Medium Reference: Transport Layer Functions
10. TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order.
True Difficulty: Medium Reference: Transport and Network Layer Protocols
17. A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.
True Difficulty: Medium Reference: Wired Ethernet
21. A forwarding table tells a switch which port it should send out a packet to get to the destination computer.
True Difficulty: Medium Reference: Wired Ethernet
31. 802.11b provides three separate channels for indoor use in the U.S. that can be used for communication between the access point and other wireless devices on the network.
True Difficulty: Medium Reference: Wireless Ethernet
49. Wired Equivalent Privacy requires that each user have a preconfigured key in order to communicate with an access point.
True Difficulty: Medium Reference: Wireless Ethernet
51. Directional antennas produce a stronger signal over longer distances than omnidirectional antennas.
True Difficulty: Medium Reference: Wireless Ethernet